CISA KEV 정보
| 취약점명 | Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability |
|---|---|
| 설명 | A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial-of-service (DoS) condition. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-20 |
| 등록일 (KEV) | 2022-03-03 |
| 조치 기한 | 2022-03-17 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2018-0159 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HAV:N/AC:L/Au:N/C:N/I:N/A:C설명: A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.
CWE: CWE-20
참조
- http://www.securityfocus.com/bid/103562 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1040595 [Broken Link, Third Party Advisory, VDB Entry]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos [Vendor Advisory]
- http://www.securityfocus.com/bid/103562 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1040595 [Broken Link, Third Party Advisory, VDB Entry]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0159 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.