First published: Thu Jan 10 2019(Updated: )
A vulnerability in the access control logic of the Secure Shell (SSH) server of Cisco IOS and IOS XE Software may allow connections sourced from a virtual routing and forwarding (VRF) instance despite the absence of the vrf-also keyword in the access-class configuration. The vulnerability is due to a missing check in the SSH server. An attacker could use this vulnerability to open an SSH connection to an affected Cisco IOS or IOS XE device with a source address belonging to a VRF instance. Once connected, the attacker would still need to provide valid credentials to access the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =16.6.2 | |
Puppet Cisco IOS | =16.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0484 is classified as a medium-severity vulnerability affecting Cisco IOS and IOS XE software.
To fix CVE-2018-0484, upgrade your Cisco IOS or IOS XE software to a version that addresses this vulnerability.
CVE-2018-0484 affects Cisco IOS versions 16.6.2 and 16.6.4.
CVE-2018-0484 is an access control vulnerability in the SSH server of Cisco IOS.
Yes, CVE-2018-0484 may allow unauthorized connections to the SSH server from a VRF instance.