First published: Wed Oct 17 2018(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application of an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =9.2\(0.43\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0456 has a severity rating of high, indicating significant impact on affected systems.
To fix CVE-2018-0456, upgrade to the fixed version of Cisco NX-OS that addresses this vulnerability.
CVE-2018-0456 affects Cisco NX-OS versions 9.2(0.43) and potentially other versions that utilize SNMP.
CVE-2018-0456 allows an authenticated, remote attacker to cause the SNMP application to restart unexpectedly.
The vulnerable component in CVE-2018-0456 is the SNMP input packet processor of Cisco NX-OS software.