First published: Fri Oct 05 2018(Updated: )
A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. The vulnerability is due to insufficient processing of PTP packets. An attacker could exploit this vulnerability by sending a custom PTP packet to, or through, an affected device. A successful exploit could allow the attacker to cause a DoS condition for the PTP subsystem, resulting in time synchronization issues across the network.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(4\)e | |
Cisco IOS | =15.2\(5\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0473 is classified as a high-severity vulnerability that could lead to a denial of service condition.
To mitigate CVE-2018-0473, ensure that your Cisco IOS software version is upgraded to a patched release that addresses this vulnerability.
CVE-2018-0473 affects Cisco IOS versions 15.2(4)e and 15.2(5) and may impact other versions as well.
CVE-2018-0473 allows an unauthenticated remote attacker to exploit the vulnerability to cause a denial of service.
No, CVE-2018-0473 can be exploited without authentication, making it more critical to address.