6.5

CVE-2018-0331

A vulnerability in the Cisco Discovery Protocol (formerly known as CDP) subsystem of devices running, or based on, Cisco NX-OS Software contain a vulnerability that could allow an unauthenticated, adjacent attacker to create a denial of service (DoS) condition. The vulnerability is due to a failure to properly validate certain fields within a Cisco Discovery Protocol message prior to processing it. An attacker with the ability to submit a Cisco Discovery Protocol message designed to trigger the issue could cause a DoS condition on an affected device while the device restarts. This vulnerability affects Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvc89242, CSCve40943, CSCve40953, CSCve40965, CSCve40970, CSCve40978, CSCve40992, CSCve41000, CSCve41007.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoNx-os Version >= 7.1 < 7.1\(5\)n1\(1\)
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version >= 7.3 < 7.3\(3\)n1\(1\)
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version6.0
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version7.0
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version7.2
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version >= 6.2 < 6.2\(20\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version >= 7.2 < 7.2\(2\)d1\(3\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version >= 7.3 < 7.3\(2\)d1\(1\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version >= 8.1 < 8.1\(2\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version >= 8.2 < 8.2\(1\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version8.0
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version < 7.0\(3\)i3
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version >= 7.0\(3\)i4 < 7.0\(3\)i7\(1\)
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version < 7.0\(3\)i7\(1\)
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version >= 6.0 < 7.3\(3\)n1\(1\)
   CiscoNexus 6001p Version-
   CiscoNexus 6001t Version-
CiscoNx-os Version >= 5.2 < 8.1\(1a\)
   CiscoMds 9000 Version-
CiscoNx-os Version < 2.2\(8g\)
   CiscoUcs 6120xp Version-
   CiscoUcs 6140xp Version-
   CiscoUcs 6248up Version-
   CiscoUcs 6296up Version-
   CiscoUcs 6324 Version-
   CiscoUcs 6332 Version-
CiscoNx-os Version >= 2.5 < 3.1\(2f\)
   CiscoUcs 6120xp Version-
   CiscoUcs 6140xp Version-
   CiscoUcs 6248up Version-
   CiscoUcs 6296up Version-
   CiscoUcs 6324 Version-
   CiscoUcs 6332 Version-
CiscoFirepower Extensible Operating System Version >= 1.1 < 2.0.1.153
   CiscoFirepower 4110 Version-
   CiscoFirepower 4120 Version-
   CiscoFirepower 4140 Version-
   CiscoFirepower 4150 Version-
CiscoFirepower Extensible Operating System Version >= 2.1.1 < 2.1.1.86
   CiscoFirepower 4110 Version-
   CiscoFirepower 4120 Version-
   CiscoFirepower 4140 Version-
   CiscoFirepower 4150 Version-
CiscoFirepower Extensible Operating System Version >= 2.2.1 < 2.2.1.70
   CiscoFirepower 4110 Version-
   CiscoFirepower 4120 Version-
   CiscoFirepower 4140 Version-
   CiscoFirepower 4150 Version-
CiscoFxos Version >= 2.2.2 < 2.2.2.14
   CiscoFirepower 4110 Version-
   CiscoFirepower 4120 Version-
   CiscoFirepower 4140 Version-
   CiscoFirepower 4150 Version-
CiscoFirepower Extensible Operating System Version >= 2.1.1 < 2.1.1.86
CiscoFirepower Extensible Operating System Version >= 2.2.1 < 2.2.1.70
CiscoFxos Version >= 1.1 < 2.0.1.152
CiscoFxos Version >= 2.2.2 < 2.2.2.14
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.32% 0.518
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 6.1 6.5 6.9
AV:A/AC:L/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.