var-201810-0345
Vulnerability from variot

A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. The vulnerability is due to insufficient processing of PTP packets. An attacker could exploit this vulnerability by sending a custom PTP packet to, or through, an affected device. A successful exploit could allow the attacker to cause a DoS condition for the PTP subsystem, resulting in time synchronization issues across the network. Cisco IOS The software contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Cisco 2500 Series Connected Grid Switches and so on are all different types of switches from Cisco. Attackers can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCvf94015 and CSCvh77659

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0345",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "15.2\\(4\\)e"
      },
      {
        "model": "ios",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "15.2\\(5\\)"
      },
      {
        "model": "ios",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "2000"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4010"
      },
      {
        "model": "series connected grid switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "2500"
      },
      {
        "model": "connected grid ethernet switch module interface card",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "industrial ethernet 2000u series switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3000"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "3010"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "4000"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cisco",
        "version": "5000"
      },
      {
        "model": "automation allen-bradley stratix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "83000"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e0a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "8000"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea.fc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "8000"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e0a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5700"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea.fc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5700"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e0a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5410"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea.fc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5410"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5410"
      },
      {
        "model": "automation allen-bradley stratix 15.2 eb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5410"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e0a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5400"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea.fc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5400"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5400"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5400"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5400"
      },
      {
        "model": "automation allen-bradley armorstratix 15.2 e0a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5700"
      },
      {
        "model": "automation allen-bradley armorstratix 15.2 ea.fc4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5700"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwall",
        "version": "8000"
      },
      {
        "model": "automation allen-bradley armorstratix 15.2 ea3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwall",
        "version": "5700"
      },
      {
        "model": "ios software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "50000"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "40100"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "40000"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30100"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "30000"
      },
      {
        "model": "industrial ethernet 2000u series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "industrial ethernet series switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "20000"
      },
      {
        "model": "connected grid ethernet switch module interface card",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "0"
      },
      {
        "model": "series connected grid switches",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "25000"
      },
      {
        "model": "automation allen-bradley stratix 15.2 ea7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "8300"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e2a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "8000"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e2a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5700"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e2a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5410"
      },
      {
        "model": "automation allen-bradley stratix 15.2 e2a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5400"
      },
      {
        "model": "automation allen-bradley armorstratix 15.2 e2a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "5700"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "BID",
        "id": "105427"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,Cisco,Rockwell Automation reported these vulnerabilities to NCCIC.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2018-0473",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2018-0473",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-20260",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-118675",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 4.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.6,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2018-0473",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-0473",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-20260",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201809-1255",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-118675",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. The vulnerability is due to insufficient processing of PTP packets. An attacker could exploit this vulnerability by sending a custom PTP packet to, or through, an affected device. A successful exploit could allow the attacker to cause a DoS condition for the PTP subsystem, resulting in time synchronization issues across the network. Cisco IOS The software contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Cisco 2500 Series Connected Grid Switches and so on are all different types of switches from Cisco. \nAttackers can exploit this issue to cause denial-of-service conditions. \nThis issue is being tracked by Cisco Bug ID CSCvf94015 and CSCvh77659",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "BID",
        "id": "105427"
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-0473",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-094-03",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "105427",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1041737",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2018.2903.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1153",
        "trust": 0.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-094-02",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "db": "BID",
        "id": "105427"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "id": "VAR-201810-0345",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      }
    ],
    "trust": 1.3775939099999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:01:10.091000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20180926-ptp",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ptp"
      },
      {
        "title": "Cisco IOS Software PrecisionTimeProtocol denies service patch vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/141457"
      },
      {
        "title": "Multiple Cisco product IOS Software Precision Time Protocol Fixes for Subsystem Resource Management Error Vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=85264"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ptp"
      },
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/105427"
      },
      {
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-094-03"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1041737"
      },
      {
        "trust": 0.9,
        "url": "http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0473"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0473"
      },
      {
        "trust": 0.6,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-094-02"
      },
      {
        "trust": 0.6,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ir800-memwrite"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2018.2903.2/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/78478"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "db": "BID",
        "id": "105427"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "db": "BID",
        "id": "105427"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-09-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "date": "2018-10-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "date": "2018-09-26T00:00:00",
        "db": "BID",
        "id": "105427"
      },
      {
        "date": "2019-02-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "date": "2018-10-05T14:29:05.137000",
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "date": "2018-09-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-09-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-20260"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-118675"
      },
      {
        "date": "2019-04-05T07:00:00",
        "db": "BID",
        "id": "105427"
      },
      {
        "date": "2019-04-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      },
      {
        "date": "2019-10-03T00:03:26.223000",
        "db": "NVD",
        "id": "CVE-2018-0473"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco IOS Software resource management vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-013054"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201809-1255"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.