First published: Fri Oct 05 2018(Updated: )
A vulnerability in the Open Shortest Path First version 3 (OSPFv3) implementation in Cisco IOS and IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. The vulnerability is due to incorrect handling of specific OSPFv3 packets. An attacker could exploit this vulnerability by sending crafted OSPFv3 Link-State Advertisements (LSA) to an affected device. An exploit could allow the attacker to cause an affected device to reload, leading to a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =16.2.1 | |
Cisco IOS XE Web UI | =16.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0466 has a high severity rating due to its ability to allow unauthenticated attackers to disrupt device operation.
To fix CVE-2018-0466, update your Cisco IOS or IOS XE software to the latest version that addresses this vulnerability.
CVE-2018-0466 affects Cisco IOS version 16.2.1 and potentially other versions within the same series.
CVE-2018-0466 allows an adjacent attacker to send specific OSPFv3 packets that can cause the device to reload.
CVE-2018-0466 is not remotely exploitable as it requires an adjacent attacker to trigger the vulnerability.