First published: Wed Mar 28 2018(Updated: )
A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =denali-16.3.1 | |
Cisco IOS XE Web UI | =denali-16.3.3 | |
Cisco 4321/k9 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4351/k9-rf Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4451-X Integrated Services Router | ||
Cisco ASR 1000 Series Route Processor (RP2) | ||
Cisco ASR 1000 Series Route Processor (RP3) | ||
Cisco ASR 1001 | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002 Fixed Router | ||
Cisco ASR 1002-X | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-12x48UQ-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-12X48UR-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24PD-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24PS-E | ||
Cisco Catalyst 3650-24PS-L | ||
Cisco Catalyst 3650-24PS | ||
Cisco Catalyst 3650-24TD-E | ||
Cisco Catalyst 3650-24TD-L | ||
Cisco Catalyst 3650-24TD Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24TS-L | ||
Cisco Catalyst 3650-24TS-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQ-E | ||
Cisco Catalyst 3650-48FQ-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 Series Switch | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650-48PD-E | ||
Cisco Catalyst 3650-48PD | ||
Cisco Catalyst 3650-48PD-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48PQ-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48PS-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 Series | ||
Cisco Catalyst 3650-48TQ-S | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-8X24UQ | ||
Cisco Catalyst 3650-8X24UQ | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 9300-24s-e Firmware | ||
Cisco Catalyst 3850-24S-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-24T-L | ||
Cisco Catalyst 3850-24T-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48F-E | ||
Cisco Catalyst 3850-48F-L | ||
Cisco Catalyst 3850-48F-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48P-S | ||
Cisco Catalyst 3850-48T-E | ||
Cisco Catalyst 3850-48T-L | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 3850-48U-E | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48XS | ||
Cisco Catalyst 3850-48XS | ||
Cisco Catalyst 3850-48XS-S | ||
Cisco Catalyst 3850-12X48U-E | ||
Cisco Catalyst 3850-12X48U-L | ||
Cisco Catalyst 3850-12X48U-S | ||
Cisco Cloud Services Router 1000V |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0177 has been assigned a medium severity rating due to its potential to cause high CPU utilization and device reloads.
To fix CVE-2018-0177, upgrade to a patched version of Cisco IOS XE Software, specifically versions denali-16.3.2 or denali-16.3.4 and later.
CVE-2018-0177 affects Cisco Catalyst 3850 and 3650 Series Switches running specific versions of IOS XE.
Yes, CVE-2018-0177 can be exploited by an unauthenticated remote attacker.
The impact of CVE-2018-0177 includes high CPU utilization, generation of traceback messages, or device reloads.