Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2018-0160
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
A vulnerability in Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper management of memory resources, referred to as a double free. An attacker could exploit this vulnerability by sending crafted SNMP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. To exploit this vulnerability via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability via SNMP Version 3, the attacker must know the user credentials for the affected system. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS XE Software, have been configured to be queried over SNMP, and have Network Address Translation (NAT) enabled. Cisco Bug IDs: CSCve75818..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.3/10
- Exploit Score
- 6.8/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- Single
- Impact Score
- 6.9/10
- Confidentiality Impact
- None
- Availability Impact
- Complete
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 6.3/10
- Exploit Score
- 1.8/10
- Access Vector
- Network
- Access Complexity
- High
- Privileges Required
- Low
- Impact Score
- 4/10
- Confidentiality Impact
- None
- Availability Impact
- High
- Integrity Impact
- None
- Scope
- Changed
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:me_3600x-24cx-m:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:me_3600x-24fs-m:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:me_3600x-24ts-m:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:cisco:me_3800x-24fs-m:-:*:*:*:*:*:*:* |
No
|
- |