7.1
CVSSv2

CVE-2018-0282

Published: 10/01/2019 Updated: 28/08/2020
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.8 | Impact Score: 4 | Exploitability Score: 2.2
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote malicious user to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the malicious user to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 15.2\\(2\\)e4

cisco ios_xe -

Vendor Advisories

A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state While this vulnerability potentially affects all TCP applications, the o ...