Remote Code Execution Vulnerability in Cisco Fabric Services for Cisco Devices
CVE-2018-0314

9.8CRITICAL

Key Information:

Vendor
Cisco
Vendor
CVE Published:
20 June 2018

Summary

A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and NX-OS Software enables an unauthenticated remote attacker to execute arbitrary code on the affected devices. This issue arises from insufficient validation of the packet headers of Cisco Fabric Services when processing packet data. An attacker can exploit this vulnerability by sending specially crafted packets to the targeted device, potentially leading to a buffer overflow condition that allows unauthorized code execution. Affected systems include various models of Cisco's next-generation firewalls, security appliances, multilayer switches, and fabric interconnects, all of which may be configured to utilize Cisco Fabric Services.

Affected Version(s)

Cisco FXOS and NX-OS unknown Cisco FXOS and NX-OS unknown

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.