6.8

CVE-2018-0291

A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. This vulnerability affects Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCuw99630, CSCvg71290, CSCvj67977.

Data is provided by the National Vulnerability Database (NVD)
CiscoNx-os Version >= 6.0 < 7.3\(3\)n1\(1\)
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version >= 6.2 < 8.1\(2\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version < 7.0\(3\)i3
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version >= 7.0\(3\)i4 < 7.0\(3\)i7\(1\)
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version < 7.0\(3\)i3
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version >= 7.0\(3\)i4 < 7.0\(3\)i7\(1\)
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version >= 6.0 < 7.3\(3\)n1\(1\)
   CiscoNexus 6001p Version-
   CiscoNexus 6001t Version-
CiscoNx-os Version7.0
   CiscoNexus 9500 Version-
CiscoNx-os Version < 2.2
   CiscoUcs 6120xp Version-
   CiscoUcs 6140xp Version-
   CiscoUcs 6248up Version-
   CiscoUcs 6296up Version-
   CiscoUcs 6324 Version-
   CiscoUcs 6332 Version-
CiscoNx-os Version >= 2.5 < 3.2\(2b\)
   CiscoUcs 6120xp Version-
   CiscoUcs 6140xp Version-
   CiscoUcs 6248up Version-
   CiscoUcs 6296up Version-
   CiscoUcs 6324 Version-
   CiscoUcs 6332 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.91% 0.736
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 6.8 8 6.9
AV:N/AC:L/Au:S/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.