Remote Code Execution Vulnerability in Cisco Fabric Services Software
CVE-2018-0304
9.8CRITICAL
Summary
A vulnerability in Cisco Fabric Services components of Cisco FXOS Software and NX-OS Software could be exploited by an unauthenticated, remote attacker. By sending a specially crafted Cisco Fabric Services packet, an attacker may read sensitive memory content, trigger a denial of service (DoS) condition, or execute arbitrary code with root privileges. The root cause of the vulnerability lies in the insufficient validation of Cisco Fabric Services packet headers, enabling potential buffer overflow or overread conditions.
Affected Version(s)
Cisco FXOS and NX-OS unknown Cisco FXOS and NX-OS unknown
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved