{ "CVE_data_meta" : { "ASSIGNER" : "psirt@cisco.com", "ID" : "CVE-2018-0156", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Cisco IOS and IOS XE", "version" : { "version_data" : [ { "version_value" : "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-399" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04" }, { "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05" }, { "name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi", "refsource" : "CONFIRM", "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi" }, { "name" : "103569", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/103569" }, { "name" : "1040596", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1040596" } ] } }