First published: Thu Jun 21 2018(Updated: )
A vulnerability in the Cisco Discovery Protocol component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on the affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2 adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. This vulnerability affects the following if configured to use Cisco Discovery Protocol: Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvc22202, CSCvc22205, CSCvc22208, CSCvc88078, CSCvc88150, CSCvc88159, CSCvc88162, CSCvc88167.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.0\(0\)hsk\(0.357\) | |
Cisco NX-OS | =8.1\(0.2\)s0 | |
Cisco NX-OS | =8.8\(0.1\) | |
Cisco Nexus 5000 firmware | ||
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco Nexus 56128p Firmware | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware | ||
Cisco NX-OS | =8.0\(1\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 series | ||
Cisco NX-OS | =8.8\(3.5\)s0 | |
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92304qc | ||
Cisco Nexus 9236c | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93120tx | ||
Cisco Nexus 93128tx | ||
Cisco Nexus 93180YC-EX | ||
Cisco Nexus 9332pq | ||
Cisco Nexus 9372px | ||
Cisco Nexus 9372tx | ||
Cisco Nexus 9396px | ||
Cisco Nexus 9396tx | ||
Cisco Nexus 9504 | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 | ||
Cisco Nexus N9K-C9508-FM-R | ||
Cisco x9636q-r | ||
Cisco Nexus N9K-X9636Q-R | ||
Cisco NX-OS | =7.0\(3\)i4\(7\) | |
Cisco NX-OS | =7.0\(3\)i7\(1\) | |
Cisco Nexus 172tq-xl | ||
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064x | ||
Cisco Nexus 3100v | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-X/3132Q-XL | ||
Cisco Nexus 3132Q-X/3132Q-XL | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172PQ/PQ-XL | ||
Cisco Nexus 3172PQ/PQ-XL | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-x/xl | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco Nexus 36180YC-R | ||
Cisco Nexus 2148T FEX Switch | ||
Cisco Nexus 2224TP FEX Switch | ||
Cisco Nexus 2232pp fex switch | ||
Cisco Nexus 2232tm-e 10ge | ||
Cisco Nexus 2232tm fex switch | ||
Cisco Nexus 2248pq 10ge | ||
Cisco Nexus 2248TP FEX Switch | ||
Cisco Nexus 2248TP FEX Switch | ||
Cisco Nexus 6001p | ||
Cisco Nexus 6001T Firmware | ||
Cisco NX-OS | =3.1\(3a\)a | |
Cisco UCS 6120xp | ||
Cisco UCS 6140xp | ||
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 6332 | ||
Cisco Firepower Extensible Operating System | >=1.1<1.1.4.179 | |
Cisco Firepower Extensible Operating System | >=2.0<2.0.1.153 | |
Cisco Firepower Extensible Operating System | >=2.1.1<2.1.1.86 | |
Cisco Firepower Extensible Operating System | >=2.2.1<2.2.1.70 | |
Cisco Firepower Extensible Operating System | >=2.2.2<2.2.2.17 | |
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco Firepower 9300 Security Appliances |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0303 is rated as a critical vulnerability due to its potential to allow unauthorized code execution or denial of service.
To fix CVE-2018-0303, update the Cisco NX-OS Software to a version that addresses this vulnerability.
CVE-2018-0303 affects several versions of Cisco NX-OS Software, including 7.0(0)hsk(0.357), 8.1(0.2)s0, and 8.8(0.1).
CVE-2018-0303 requires an adjacent attacker to exploit the vulnerability, thus it cannot be exploited remotely.
Exploitation of CVE-2018-0303 could lead to arbitrary code execution as root or cause a denial of service condition.