First published: Fri Oct 05 2018(Updated: )
A vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to improper processing of malformed IPsec Authentication Header (AH) or Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by sending malformed IPsec packets to be processed by an affected device. An exploit could allow the attacker to cause a reload of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =15.5\(3\)s5.36 | |
Cisco IOS XE Web UI | =16.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0472 has been categorized with a high severity level due to its potential to allow unauthenticated remote attackers to reload affected devices.
To fix CVE-2018-0472, upgrade to the recommended patched version of Cisco IOS XE software provided by Cisco.
CVE-2018-0472 affects multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance.
CVE-2018-0472 is caused by improper processing of malicious IPsec packets within the driver code.
Yes, CVE-2018-0472 can be exploited by unauthenticated remote attackers, leading to a device reload.