Improper input validation in Cisco IOS XE - CVE-2018-0159

 

Improper input validation in Cisco IOS XE - CVE-2018-0159

Published: March 30, 2018 / Updated: March 8, 2022


Vulnerability identifier: #VU11354
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Green
CVE-ID: CVE-2018-0159
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vendor: Cisco Systems, Inc
Affected software:
Cisco IOS XE

Detailed vulnerability description

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality due to improper validation of specific IKEv1 packets. A remote attacker can send specially crafted IKEv1 packets during an IKE negotiation and cause the service to crash.


How to mitigate CVE-2018-0159

Update to evrsions 15.4(2)S, 15.7(3.1.11D)OT, 15.6(1)SN, 15.5(0)IA1.1, 15.4(2)T1, 15.4(2)T, 15.4(2)SN1, 15.4(2)SN, 15.4(2)S1, 15.4(2)CG, 15.4(2.1.1)S, 15.4(1)IA1.1, 15.4(1.13)S, 15.4(1.12)T, 15.4(1.9.2)XEB, 15.3(3)JPC7, 15.3(3)JPC6, 15.3(3)JPC5, 15.3(3)JF2, 15.3(3)JF, 15.3(3)JE, 15.3(3)JD7, 15.3(3)JD5, 15.3(3)JD3, 15.3(3)JC6, 15.3(3)JA11, 15.3(1)IE101.209, 15.2(6.3.0i)E, 15.2(5.0)ST, 15.2(4.0)ST, 15.2(4.0.64a)E, 15.2(4.0.21)E, 15.2(2)E8, 15.2(1)SY2, 15.2(1)SY1.13, 15.1(2)SY11.64, 12.2(60)EZ13 or 12.2(33)CY2.

Sources