First published: Thu Mar 08 2018(Updated: )
A vulnerability in specific CLI commands for the Cisco Identity Services Engine could allow an authenticated, local attacker to cause a denial of service (DoS) condition. The device may need to be manually rebooted to recover. The vulnerability is due to lack of proper input validation of the CLI user input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and issuing a crafted, malicious CLI command on the targeted device. A successful exploit could allow the attacker to cause a DoS condition. The attacker must have valid administrative privileges on the device to exploit this vulnerability. Cisco Bug IDs: CSCvf63414, CSCvh51992.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =2.1\(0.474\) | |
Cisco Identity Services Engine | =2.2\(1.145\) | |
Cisco Identity Services Engine | =2.4\(0.247\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0211 has a high severity level as it can lead to a denial of service condition.
To fix CVE-2018-0211, it is recommended to apply the security patches provided by Cisco for the affected versions of the Identity Services Engine.
CVE-2018-0211 affects users of Cisco Identity Services Engine versions 2.1(0.474), 2.2(1.145), and 2.4(0.247).
An authenticated, local attacker can exploit CVE-2018-0211 to cause the device to enter a denial of service state.
CVE-2018-0211 can disrupt network operations as it requires manual rebooting of the device to recover from the denial of service condition.