{ "id": "CVE-2018-0467", "sourceIdentifier": "ykramarz@cisco.com", "published": "2018-10-05T14:29:04.590", "lastModified": "2019-04-15T12:31:08.757", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability in the IPv6 processing code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of specific IPv6 hop-by-hop options. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to or through the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device." }, { "lang": "es", "value": "Una vulnerabilidad en el c\u00f3digo de procesamiento IPv6 en Cisco IOS y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto sin autenticar haga que el dispositivo se reinicie. La vulnerabilidad se debe a una gesti\u00f3n incorrecta de determinadas opciones hop-by-hop IPv6. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un paquete IPv6 malicioso a o a trav\u00e9s del dispositivo afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el atacante consiga que el dispositivo se recargue, provocando una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 4.0 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] }, { "source": "ykramarz@cisco.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios_xe:15.6\\(2\\)sp:*:*:*:*:*:*:*", "matchCriteriaId": "65B22948-0DA9-4E13-8C00-2FD738247DD3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios_xe:everest-16.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0695D994-4AAE-4B3B-9A2A-68AE884D1586" } ] } ] } ], "references": [ { "url": "http://www.securitytracker.com/id/1041737", "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03", "source": "ykramarz@cisco.com" }, { "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipv6hbh", "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ] } ] }