A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
References
Link Resource
http://www.securityfocus.com/bid/103569 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040596 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 Third Party Advisory US Government Resource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: cisco

Published: 2018-03-28T22:00:00

Updated: 2018-04-19T13:57:01

Reserved: 2017-11-27T00:00:00


Link: CVE-2018-0156

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-03-28T22:29:00.467

Modified: 2020-09-02T16:03:11.510


Link: CVE-2018-0156

JSON object: View

cve-icon Redhat Information

No data.