First published: Thu Jun 21 2018(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco NX-OS on the Cisco Nexus 4000 Series Switch could allow an authenticated, remote attacker to cause the device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete validation of an SNMP poll request for a specific MIB. An attacker could exploit this vulnerability by sending a specific SNMP poll request to the targeted device. An exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvg10442.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =4.1\(2\)e1\(1r\) | |
Cisco Nexus 4001i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0299 is classified as a high severity vulnerability due to its potential to cause a denial of service (DoS) condition.
To mitigate CVE-2018-0299, upgrade to a fixed release of Cisco NX-OS that addresses this vulnerability.
CVE-2018-0299 affects devices running Cisco NX-OS version 4.1(2)e1(1r) in the Cisco Nexus 4000 Series Switch.
The impact of CVE-2018-0299 is that it allows an authenticated, remote attacker to cause the affected device to reload unexpectedly.
Yes, CVE-2018-0299 can be exploited remotely by an authenticated attacker.