CISA KEV 정보
| 취약점명 | Cisco Catalyst Bidirectional Forwarding Detection Denial-of-Service Vulnerability |
|---|---|
| 설명 | A vulnerability in the Bidirectional Forwarding Detection (BFD) offload implementation of Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to cause a crash of the iosd process, causing a denial-of-service (DoS) condition. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-388 |
| 등록일 (KEV) | 2022-03-03 |
| 조치 기한 | 2022-03-17 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2018-0155 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HAV:N/AC:L/Au:N/C:N/I:N/A:C설명: A vulnerability in the Bidirectional Forwarding Detection (BFD) offload implementation of Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to cause a crash of the iosd process, causing a denial of service (DoS) condition. The vulnerability is due to insufficient error handling when the BFD header in a BFD packet is incomplete. An attacker could exploit this vulnerability by sending a crafted BFD message to or across an affected switch. A successful exploit could allow the attacker to trigger a reload of the system. This vulnerability affects Catalyst 4500 Supervisor Engine 6-E (K5), Catalyst 4500 Supervisor Engine 6L-E (K10), Catalyst 4500 Supervisor Engine 7-E (K10), Catalyst 4500 Supervisor Engine 7L-E (K10), Catalyst 4500E Supervisor Engine 8-E (K10), Catalyst 4500E Supervisor Engine 8L-E (K10), Catalyst 4500E Supervisor Engine 9-E (K10), Catalyst 4500-X Series Switches (K10), Catalyst 4900M Switch (K5), Catalyst 4948E Ethernet Switch (K5). Cisco Bug IDs: CSCvc40729.
CWE: CWE-388 | CWE-755
참조
- http://www.securityfocus.com/bid/103565 [Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1040587 [Third Party Advisory, VDB Entry]
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 [Third Party Advisory, US Government Resource]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd [Vendor Advisory]
- http://www.securityfocus.com/bid/103565 [Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1040587 [Third Party Advisory, VDB Entry]
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 [Third Party Advisory, US Government Resource]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0155 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.