First published: Fri Oct 05 2018(Updated: )
A vulnerability in the IPv6 processing code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of specific IPv6 hop-by-hop options. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to or through the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =15.6\(2\)sp | |
Cisco IOS XE Web UI | =16.6.1 | |
Cisco IOS XE Web UI | =everest-16.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0467 is considered a high severity vulnerability that could lead to device reloads.
To fix CVE-2018-0467, upgrade to the latest patched version of Cisco IOS or IOS XE software.
CVE-2018-0467 allows an unauthenticated remote attacker to cause affected devices to reload, disrupting network services.
CVE-2018-0467 affects specific versions of Cisco IOS XE including 15.6(2)SP and 16.6.1.
No specific workarounds are documented for CVE-2018-0467; the recommended action is to apply the security updates.