Lucene search

K
cve[email protected]CVE-2018-0117
HistoryFeb 08, 2018 - 7:29 a.m.

CVE-2018-0117

2018-02-0807:29:00
CWE-20
web.nvd.nist.gov
29
cisco
virtualized packet core
vpc-di
software
vulnerability
remote attacker
dos
nvd
cve-2018-0117

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.3%

A vulnerability in the ingress packet processing functionality of the Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software could allow an unauthenticated, remote attacker to cause both control function (CF) instances on an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient handling of user-supplied data by the affected software. An attacker could exploit this vulnerability by sending malicious traffic to the internal distributed instance (DI) network address on an affected system. A successful exploit could allow the attacker to cause an unhandled error condition on the affected system, which would cause the CF instances to reload and consequently cause the entire VPC to reload, resulting in the disconnection of all subscribers and a DoS condition on the affected system. This vulnerability affects Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software N4.0 through N5.5 with the Cisco StarOS operating system 19.2 through 21.3. Cisco Bug IDs: CSCve17656.

Affected configurations

NVD
Node
ciscoasr_5000_firmwareMatch21.1.v0.66836
OR
ciscoasr_5000_firmwareMatch21.1.v7
OR
ciscoasr_5000_firmwareMatch21.3.0
OR
ciscoasr_5000_firmwareMatch21.6.0
AND
ciscoasr_5000Match-
Node
ciscoasr_5500_firmwareMatch21.1.v0.66836
OR
ciscoasr_5500_firmwareMatch21.1.v7
OR
ciscoasr_5500_firmwareMatch21.3.0
OR
ciscoasr_5500_firmwareMatch21.6.0
AND
ciscoasr_5500Match-

CNA Affected

[
  {
    "product": "Cisco Virtualized Packet Core-Distributed Instance",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco Virtualized Packet Core-Distributed Instance"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.3%

Related for CVE-2018-0117