First published: Wed Mar 28 2018(Updated: )
A vulnerability in the Zone-Based Firewall code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a device to reload. The vulnerability is due to the way fragmented packets are handled in the firewall code. An attacker could exploit this vulnerability by sending fragmented IP Version 4 or IP Version 6 packets through an affected device. An exploit could allow the attacker to cause the device to crash, resulting in a denial of service (DoS) condition. The following releases of Cisco IOS XE Software are vulnerable: Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a. Cisco Bug IDs: CSCvf60296.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.4.1 | |
Cisco IOS XE Web UI | =16.4.2 | |
Cisco IOS XE Web UI | =16.5.1 | |
Cisco IOS XE Web UI | =16.5.1b | |
Cisco IOS XE Web UI | =16.6.1 | |
Cisco IOS XE Web UI | =16.6.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0157 has been classified with a high severity due to its potential impact on device availability.
To mitigate CVE-2018-0157, upgrade to a fixed Cisco IOS XE Software version as specified in the security advisories.
CVE-2018-0157 affects various versions of Cisco IOS XE Software including versions 16.4.1, 16.4.2, 16.5.1, 16.5.1b, 16.6.1, and 16.6.1a.
An unauthenticated, remote attacker can exploit CVE-2018-0157 by sending specially crafted fragmented packets to target devices.
No, CVE-2018-0157 can be exploited by unauthenticated attackers, making it particularly concerning.