First published: Fri Oct 05 2018(Updated: )
A vulnerability in the Network Address Translation (NAT) Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper processing of SIP packets in transit while NAT is performed on an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted SIP packets via UDP port 5060 through an affected device that is performing NAT for SIP packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =15.5\(3\)s5.1 | |
Cisco IOS XE Web UI | =15.5\(3\)s6.1 | |
Cisco IOS XE Web UI | =16.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0476 is rated as a high-severity vulnerability due to its potential to cause device reloads.
To mitigate CVE-2018-0476, upgrade your Cisco IOS XE software to a version that is not affected by this vulnerability.
CVE-2018-0476 affects Cisco IOS XE versions 15.5(3)s5.1, 15.5(3)s6.1, and 16.6.2.
Yes, CVE-2018-0476 can be exploited by an unauthenticated, remote attacker.
CVE-2018-0476 can lead to unexpected device reloads, potentially disrupting network services.