First published: Wed Mar 28 2018(Updated: )
A vulnerability in the Bidirectional Forwarding Detection (BFD) offload implementation of Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to cause a crash of the iosd process, causing a denial of service (DoS) condition. The vulnerability is due to insufficient error handling when the BFD header in a BFD packet is incomplete. An attacker could exploit this vulnerability by sending a crafted BFD message to or across an affected switch. A successful exploit could allow the attacker to trigger a reload of the system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd This advisory is part of the March 28, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 20 Cisco Security Advisories that describe 22 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst 4500 Series Switches | ||
Cisco Catalyst 4500-X Series Switches | ||
Cisco IOS | ||
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-20180328-bfd vulnerability is rated as a high severity issue that can lead to denial of service.
The cisco-sa-20180328-bfd vulnerability affects Cisco Catalyst 4500 and 4500-X Series Switches, as well as Cisco IOS and IOS XE.
To fix cisco-sa-20180328-bfd, apply the latest software updates provided by Cisco.
The impact of cisco-sa-20180328-bfd can result in the crash of the iosd process, leading to a denial of service.
Yes, cisco-sa-20180328-bfd can be exploited by an unauthenticated remote attacker.