First published: Wed Jun 20 2018(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. This vulnerability affects Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCuw99630, CSCvg71290, CSCvj67977.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | >=6.0<7.3\(3\)n1\(1\) | |
Cisco Nexus 5000 firmware | ||
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware | ||
Cisco NX-OS | >=6.2<8.1\(2\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 series | ||
Cisco NX-OS | <7.0\(3\)i3 | |
Cisco NX-OS | >=7.0\(3\)i4<7.0\(3\)i7\(1\) | |
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92304QC Switch | ||
Cisco Nexus 9236C Switch | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco Nexus 9508 | ||
Cisco x9636q-r | ||
Cisco Nexus X9636Q-R | ||
Cisco Nexus 172tq-xl | ||
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064x | ||
Cisco Nexus 3100V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-X/3132Q-XL | ||
Cisco Nexus 3132Q-XL Firmware | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172PQ/PQ-XL | ||
Cisco Nexus 3172PQ-XL Firmware | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-XL Firmware | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco Nexus 36180YC-R | ||
Cisco Nexus 6001P Firmware | ||
Cisco Nexus 6001T Firmware | ||
Cisco NX-OS | =7.0 | |
Cisco Nexus 9500 Series | ||
Cisco NX-OS | <2.2 | |
Cisco NX-OS | >=2.5<3.2\(2b\) | |
Cisco UCS 6120xp | ||
Cisco UCS 6140xp | ||
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 6332 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0291 is classified as medium.
To fix CVE-2018-0291, upgrade to a version of Cisco NX-OS Software that is not affected by this vulnerability.
CVE-2018-0291 affects multiple versions of Cisco NX-OS Software running on supported Cisco devices.
Yes, CVE-2018-0291 can be exploited by an authenticated remote attacker.
CVE-2018-0291 is a denial of service vulnerability due to improper validation in the SNMP input packet processor.