Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-0175
Analyzed
More InfoOfficial Page
Source-psirt@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-28 Mar, 2018 | 22:29
Updated At-14 Jan, 2026 | 18:46

Format String vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCvd73664.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-03-032022-03-17Cisco IOS, XR, and XE Software Buffer Overflow VulnerabilityApply updates per vendor instructions.
Date Added: 2022-03-03
Due Date: 2022-03-17
Vulnerability Name: Cisco IOS, XR, and XE Software Buffer Overflow Vulnerability
Required Action: Apply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.0HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Secondary3.18.0HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.07.9HIGH
AV:A/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.9
Base severity: HIGH
Vector:
AV:A/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>ios>>15.4\(3\)m4.1
cpe:2.3:o:cisco:ios:15.4\(3\)m4.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>15.4\(3\)m4.1
cpe:2.3:o:cisco:ios_xe:15.4\(3\)m4.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>15.4\(3\)m4.1
cpe:2.3:o:cisco:ios_xr:15.4\(3\)m4.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>Versions up to 15.2\(4a\)ea5(inclusive)
cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>Versions up to 15.2\(4a\)ea5(inclusive)
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_stratix_8300_industrial_managed_ethernet_switch>>-
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300_industrial_managed_ethernet_switch:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>Versions up to 15.2\(6\)e0a(inclusive)
cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>Versions up to 15.2\(6\)e0a(inclusive)
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_armorstratix_5700>>-
cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_stratix_5400>>-
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_stratix_5410>>-
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_stratix_5700>>-
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_stratix_8000>>-
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>Versions up to 15.6.3m1(inclusive)
cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>Versions up to 15.6.3m1(inclusive)
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>allen-bradley_stratix_5900_services_router>>-
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900_services_router:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Secondarypsirt@cisco.com
CWE-134Primarynvd@nist.gov
CWE ID: CWE-119
Type: Secondary
Source: psirt@cisco.com
CWE ID: CWE-134
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/103564psirt@cisco.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040586psirt@cisco.com
Broken Link
Third Party Advisory
VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03psirt@cisco.com
Third Party Advisory
US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04psirt@cisco.com
Third Party Advisory
US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05psirt@cisco.com
Third Party Advisory
US Government Resource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldppsirt@cisco.com
Vendor Advisory
http://www.securityfocus.com/bid/103564af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040586af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldpaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0175134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
Hyperlink: http://www.securityfocus.com/bid/103564
Source: psirt@cisco.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040586
Source: psirt@cisco.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03
Source: psirt@cisco.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04
Source: psirt@cisco.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05
Source: psirt@cisco.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/103564
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040586
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0175
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource
Change History
0Changes found

Details not found