A vulnerability in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect memory operations that the affected software performs when the software parses a username during login authentication. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device or cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are running Cisco IOS XE Software Release Fuji 16.7.1 or Fuji 16.8.1 and are configured to use AAA for login authentication. Cisco Bug IDs: CSCvi25380.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104410 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041086 | Broken Link Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-aaa | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Jun 2022, 17:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:ios_xe:fuji-16.7.1:*:*:*:*:*:*:* cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-12cz-d_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000_series_route_processor_\(rp2\):-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-24sz-im_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_900_route_switch_processor_3_\(rsp3\):-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:fuji-16.8.1:*:*:*:*:*:*:* cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_4202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-10sz-pd_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-4sz-d_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1000_series_route_processor_\(rp3\):-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-4sz-a_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_900_route_switch_processor_2_\(rsp2\):-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_4216:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-24sz-m_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_4201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-12cz-a_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-12sz-im_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:fuji-16.8.1a:*:*:*:*:*:*:* cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_4206:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ios:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_920-24tz-m_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 9.8 |
References | (SECTRACK) http://www.securitytracker.com/id/1041086 - Broken Link, Third Party Advisory, VDB Entry |
18 Oct 2021, 12:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
05 Oct 2021, 14:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:asr_1001-hx_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x_router:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* |
Information
Published : 2018-06-07 12:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-0315
Mitre link : CVE-2018-0315
CVE.ORG link : CVE-2018-0315
JSON object : View
Products Affected
cisco
- ios_xe
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer