First published: Thu Jan 18 2018(Updated: )
A vulnerability in IPv6 ingress packet processing for Cisco UCS Central Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high CPU utilization on the targeted device. The vulnerability is due to insufficient rate limiting protection for IPv6 ingress traffic. An attacker could exploit this vulnerability by sending the affected device a high rate of IPv6 packets. Successful exploitation could allow the attacker to cause a DoS condition due to CPU and resource constraints. Cisco Bug IDs: CSCuv34544.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Central Software | =1.4\(1a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0094 is a vulnerability in IPv6 ingress packet processing for Cisco UCS Central Software that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high CPU utilization on the targeted device.
An attacker can exploit CVE-2018-0094 by sending specially crafted IPv6 packets to the affected Cisco UCS Central Software, resulting in high CPU utilization and causing a denial of service (DoS) condition.
CVE-2018-0094 has a severity rating of high with a CVSS score of 7.5.
Cisco Unified Computing System Central Software version 1.4(1a) is affected by CVE-2018-0094.
To mitigate CVE-2018-0094, it is recommended to apply the relevant security patches provided by Cisco, as mentioned in their security advisory.