Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2018-0136

CVE information

Published

5 years ago

Last Modified

2 years ago

CVSSv2.0 Severity

High

CVSSv3.1 Severity

High

Impact Analysis

Description

A vulnerability in the IPv6 subsystem of Cisco IOS XR Software Release 5.3.4 for the Cisco Aggregation Services Router (ASR) 9000 Series could allow an unauthenticated, remote attacker to trigger a reload of one or more Trident-based line cards, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect handling of IPv6 packets with a fragment header extension. An attacker could exploit this vulnerability by sending IPv6 packets designed to trigger the issue either to or through the Trident-based line card. A successful exploit could allow the attacker to trigger a reload of Trident-based line cards, resulting in a DoS during the period of time the line card takes to restart. This vulnerability affects Cisco Aggregation Services Router (ASR) 9000 Series when the following conditions are met: The router is running Cisco IOS XR Software Release 5.3.4, and the router has installed Trident-based line cards that have IPv6 configured. A software maintenance upgrade (SMU) has been made available that addresses this vulnerability. The fix has also been incorporated into service pack 7 for Cisco IOS XR Software Release 5.3.4. Cisco Bug IDs: CSCvg46800..

CVSSv2.0 Score

Severity
High
Base Score
7.8/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

CVSSv3.1 Score

Severity
High
Base Score
8.6/10
Exploit Score
3.9/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
4/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Changed
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:cisco:ios_xr:5.3.4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*
  No
-