Improper input validation in Cisco 550X Series Stackable Managed Switches - CVE-2018-0209
Published: March 12, 2018
Vulnerability identifier: #VU10937
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0209
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco 550X Series Stackable Managed Switches
Cisco 550X Series Stackable Managed Switches
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to cause DoS condition on the target system.
The weakness exists in the Simple Network Management Protocol (SNMP) subsystem communication channel due to lack of proper input throttling of ingress SNMP traffic over an internal interface. A remote attacker can send a specially crafted heavy stream of SNMP traffic and cause the device to reload.
The weakness exists in the Simple Network Management Protocol (SNMP) subsystem communication channel due to lack of proper input throttling of ingress SNMP traffic over an internal interface. A remote attacker can send a specially crafted heavy stream of SNMP traffic and cause the device to reload.
How to mitigate CVE-2018-0209
Install update from vendor's website.