6.5

CVE-2018-0197

A vulnerability in the VLAN Trunking Protocol (VTP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to corrupt the internal VTP database on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to a logic error in how the affected software handles a subset of VTP packets. An attacker could exploit this vulnerability by sending VTP packets in a sequence that triggers a timeout in the VTP message processing code of the affected software. A successful exploit could allow the attacker to impact the ability to create, modify, or delete VLANs and cause a DoS condition. There are workarounds that address this vulnerability. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS Software or Cisco IOS XE Software, are operating in VTP client mode or VTP server mode, and do not have a VTP domain name configured. The default configuration for Cisco devices that are running Cisco IOS Software or Cisco IOS XE Software and support VTP is to operate in VTP server mode with no domain name configured.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoIos Xe Version-
CiscoIos Xe Version3.2.0ja
CiscoIos Xe Version3.2.0se
CiscoIos Xe Version3.2.0sg
CiscoIos Xe Version3.2.1se
CiscoIos Xe Version3.2.1sg
CiscoIos Xe Version3.2.2se
CiscoIos Xe Version3.2.2sg
CiscoIos Xe Version3.2.3se
CiscoIos Xe Version3.2.3sg
CiscoIos Xe Version3.2.4sg
CiscoIos Xe Version3.2.5sg
CiscoIos Xe Version3.2.6sg
CiscoIos Xe Version3.2.7sg
CiscoIos Xe Version3.2.8sg
CiscoIos Xe Version3.2.9sg
CiscoIos Xe Version3.2.10sg
CiscoIos Xe Version3.2.11sg
CiscoIos Xe Version3.3.0se
CiscoIos Xe Version3.3.0sg
CiscoIos Xe Version3.3.0sq
CiscoIos Xe Version3.3.0xo
CiscoIos Xe Version3.3.1se
CiscoIos Xe Version3.3.1sg
CiscoIos Xe Version3.3.1sq
CiscoIos Xe Version3.3.1xo
CiscoIos Xe Version3.3.2se
CiscoIos Xe Version3.3.2sg
CiscoIos Xe Version3.3.2xo
CiscoIos Xe Version3.3.3se
CiscoIos Xe Version3.3.4se
CiscoIos Xe Version3.3.5se
CiscoIos Xe Version3.4.0sg
CiscoIos Xe Version3.4.0sq
CiscoIos Xe Version3.4.1sg
CiscoIos Xe Version3.4.1sq
CiscoIos Xe Version3.4.2sg
CiscoIos Xe Version3.4.3sg
CiscoIos Xe Version3.4.4sg
CiscoIos Xe Version3.4.5sg
CiscoIos Xe Version3.4.6sg
CiscoIos Xe Version3.4.7sg
CiscoIos Xe Version3.4.8sg
CiscoIos Xe Version3.5.0e
CiscoIos Xe Version3.5.0sq
CiscoIos Xe Version3.5.1e
CiscoIos Xe Version3.5.1sq
CiscoIos Xe Version3.5.2e
CiscoIos Xe Version3.5.2sq
CiscoIos Xe Version3.5.3e
CiscoIos Xe Version3.5.3sq
CiscoIos Xe Version3.5.4sq
CiscoIos Xe Version3.5.5sq
CiscoIos Xe Version3.5.6sq
CiscoIos Xe Version3.5.7sq
CiscoIos Xe Version3.6.0ae
CiscoIos Xe Version3.6.0be
CiscoIos Xe Version3.6.0e
CiscoIos Xe Version3.6.1e
CiscoIos Xe Version3.6.2ae
CiscoIos Xe Version3.6.2e
CiscoIos Xe Version3.6.3e
CiscoIos Xe Version3.6.4e
CiscoIos Xe Version3.6.5ae
CiscoIos Xe Version3.6.5be
CiscoIos Xe Version3.6.5e
CiscoIos Xe Version3.6.6e
CiscoIos Xe Version3.7.0e
CiscoIos Xe Version3.7.1e
CiscoIos Xe Version3.7.2e
CiscoIos Xe Version3.7.3e
CiscoIos Xe Version3.7.4e
CiscoIos Xe Version3.7.5e
CiscoIos Xe Version3.8.0e
CiscoIos Xe Version3.8.1e
CiscoIos Xe Version3.8.2e
CiscoIos Xe Version3.8.3e
CiscoIos Xe Version3.8.4e
CiscoIos Xe Version3.8.5ae
CiscoIos Xe Version3.8.5e
CiscoIos Xe Version3.9.0e
CiscoIos Xe Version3.9.1e
CiscoIos Xe Version3.9.2be
CiscoIos Xe Version3.9.2e
CiscoIos Xe Version3.10.4s
CiscoIos Xe Version3.12.0as
CiscoIos Xe Version3.15.0s
CiscoIos Xe Version3.15.1cs
CiscoIos Xe Version3.15.1s
CiscoIos Xe Version3.15.2s
CiscoIos Xe Version3.15.3s
CiscoIos Xe Version3.15.4s
CiscoIos Xe Version3.16.0bs
CiscoIos Xe Version3.16.0cs
CiscoIos Xe Version3.16.0s
CiscoIos Xe Version3.16.1as
CiscoIos Xe Version3.16.1s
CiscoIos Xe Version3.16.2s
CiscoIos Xe Version3.16.3s
CiscoIos Xe Version3.16.4as
CiscoIos Xe Version3.16.4bs
CiscoIos Xe Version3.16.4cs
CiscoIos Xe Version3.16.4ds
CiscoIos Xe Version3.16.4es
CiscoIos Xe Version3.16.4gs
CiscoIos Xe Version3.16.5as
CiscoIos Xe Version3.16.5bs
CiscoIos Xe Version3.16.5s
CiscoIos Xe Version3.16.6bs
CiscoIos Xe Version3.16.6s
CiscoIos Xe Version3.17.0s
CiscoIos Xe Version3.17.1s
CiscoIos Xe Version3.17.3s
CiscoIos Xe Version3.17.4s
CiscoIos Xe Version16.1.1
CiscoIos Xe Version16.1.2
CiscoIos Xe Version16.1.3
CiscoIos Xe Version16.2.1
CiscoIos Xe Version16.2.2
CiscoIos Xe Version16.3.1
CiscoIos Xe Version16.3.1a
CiscoIos Xe Version16.3.2
CiscoIos Xe Version16.3.3
CiscoIos Xe Version16.3.4
CiscoIos Xe Version16.3.5
CiscoIos Xe Version16.3.5b
CiscoIos Xe Version16.4.1
CiscoIos Xe Version16.4.2
CiscoIos Xe Version16.5.1
CiscoIos Xe Version16.5.1a
CiscoIos Xe Version16.5.1b
CiscoIos Xe Version16.5.2
CiscoIos Xe Version16.6.1
CiscoIos Xe Version16.6.2
CiscoIos Xe Version16.7.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.361
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.