First published: Wed Sep 26 2018(Updated: )
A vulnerability in the VLAN Trunking Protocol (VTP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to corrupt the internal VTP database on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to a logic error in how the affected software handles a subset of VTP packets. An attacker could exploit this vulnerability by sending VTP packets in a sequence that triggers a timeout in the VTP message processing code of the affected software. A successful exploit could allow the attacker to impact the ability to create, modify, or delete VLANs and cause a DoS condition. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-vtp
Credit: Mr. Marcin T. Sleczek networkers
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180926-vtp is critical due to its potential to cause a denial of service condition.
To fix cisco-sa-20180926-vtp, upgrading to a patched version of Cisco IOS or IOS XE Software is recommended.
Cisco IOS and Cisco IOS XE Software users are affected by cisco-sa-20180926-vtp.
The impact of cisco-sa-20180926-vtp includes corruption of the internal VTP database and potential denial of service.
No, cisco-sa-20180926-vtp can be exploited by unauthenticated, adjacent attackers.