First published: Fri Oct 05 2018(Updated: )
A vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a double-free-in-memory handling by the affected software when specific HTTP requests are processed. An attacker could exploit this vulnerability by sending specific HTTP requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device. To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0469 is classified as a critical severity vulnerability due to its potential to allow remote attackers to cause device reloads.
To fix CVE-2018-0469, update the affected Cisco IOS XE Software to a patched version that addresses the vulnerability.
CVE-2018-0469 affects devices running Cisco IOS XE Software version 16.5.1.
Yes, CVE-2018-0469 can be exploited remotely without authentication.
The vulnerability in CVE-2018-0469 is caused by a double-free memory handling issue when processing specific HTTP requests.