CVE-2018-0159

A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:ios:15.3\(3\)s:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:ios_xe:15.3\(3\)s:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103562 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103562 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040595 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040595 - Broken Link, Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos - Vendor Advisory

16 Jul 2024, 17:24

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103562 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103562 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040595 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040595 - Broken Link, Third Party Advisory, VDB Entry
CWE NVD-CWE-noinfo

Information

Published : 2018-03-28 22:29

Updated : 2025-01-27 20:17


NVD link : CVE-2018-0159

Mitre link : CVE-2018-0159

CVE.ORG link : CVE-2018-0159


JSON object : View

Products Affected

cisco

  • me_3600x-24cx-m
  • ios
  • me_3600x-24ts-m
  • asr_901-6cz-f-a
  • asr_901-6cz-f-d
  • asr_901-4c-f-d
  • asr_901-12c-ft-d
  • asr_901-6cz-ft-a
  • me_3800x-24fs-m
  • asr_901-12c-f-d
  • me_3600x-24fs-m
  • asr_901-4c-ft-d
  • ios_xe
  • asr_901-6cz-ft-d
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo