VAR-201810-0345
Vulnerability from variot - Updated: 2023-12-18 12:01A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. The vulnerability is due to insufficient processing of PTP packets. An attacker could exploit this vulnerability by sending a custom PTP packet to, or through, an affected device. A successful exploit could allow the attacker to cause a DoS condition for the PTP subsystem, resulting in time synchronization issues across the network. Cisco IOS The software contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Cisco 2500 Series Connected Grid Switches and so on are all different types of switches from Cisco. Attackers can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCvf94015 and CSCvh77659
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201810-0345",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "15.2\\(4\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "15.2\\(5\\)"
},
{
"model": "ios",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "2000"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4010"
},
{
"model": "series connected grid switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "2500"
},
{
"model": "connected grid ethernet switch module interface card",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "industrial ethernet 2000u series switches",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3000"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3010"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "4000"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "5000"
},
{
"model": "automation allen-bradley stratix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "83000"
},
{
"model": "automation allen-bradley stratix 15.2 e0a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "8000"
},
{
"model": "automation allen-bradley stratix 15.2 ea.fc4",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "8000"
},
{
"model": "automation allen-bradley stratix 15.2 e0a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5700"
},
{
"model": "automation allen-bradley stratix 15.2 ea.fc4",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5700"
},
{
"model": "automation allen-bradley stratix 15.2 e0a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5410"
},
{
"model": "automation allen-bradley stratix 15.2 ea.fc4",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5410"
},
{
"model": "automation allen-bradley stratix 15.2 ea3",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5410"
},
{
"model": "automation allen-bradley stratix 15.2 eb",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5410"
},
{
"model": "automation allen-bradley stratix 15.2 e0a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5400"
},
{
"model": "automation allen-bradley stratix 15.2 ea.fc4",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5400"
},
{
"model": "automation allen-bradley stratix 15.2 ea3",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5400"
},
{
"model": "automation allen-bradley stratix 15.2 ea2",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5400"
},
{
"model": "automation allen-bradley stratix 15.2 ea1",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5400"
},
{
"model": "automation allen-bradley armorstratix 15.2 e0a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5700"
},
{
"model": "automation allen-bradley armorstratix 15.2 ea.fc4",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5700"
},
{
"model": "automation allen-bradley stratix 15.2 ea3",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "8000"
},
{
"model": "automation allen-bradley armorstratix 15.2 ea3",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "5700"
},
{
"model": "ios software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "50000"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "40100"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "40000"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30100"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30000"
},
{
"model": "industrial ethernet 2000u series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "industrial ethernet series switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "20000"
},
{
"model": "connected grid ethernet switch module interface card",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "series connected grid switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "25000"
},
{
"model": "automation allen-bradley stratix 15.2 ea7",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "8300"
},
{
"model": "automation allen-bradley stratix 15.2 e2a",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "8000"
},
{
"model": "automation allen-bradley stratix 15.2 e2a",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "5700"
},
{
"model": "automation allen-bradley stratix 15.2 e2a",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "5410"
},
{
"model": "automation allen-bradley stratix 15.2 e2a",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "5400"
},
{
"model": "automation allen-bradley armorstratix 15.2 e2a",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "5700"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "BID",
"id": "105427"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-0473"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,Cisco,Rockwell Automation reported these vulnerabilities to NCCIC.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
],
"trust": 0.6
},
"cve": "CVE-2018-0473",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-0473",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-20260",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-118675",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.6,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2018-0473",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-0473",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-20260",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201809-1255",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-118675",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "VULHUB",
"id": "VHN-118675"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. The vulnerability is due to insufficient processing of PTP packets. An attacker could exploit this vulnerability by sending a custom PTP packet to, or through, an affected device. A successful exploit could allow the attacker to cause a DoS condition for the PTP subsystem, resulting in time synchronization issues across the network. Cisco IOS The software contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Cisco 2500 Series Connected Grid Switches and so on are all different types of switches from Cisco. \nAttackers can exploit this issue to cause denial-of-service conditions. \nThis issue is being tracked by Cisco Bug ID CSCvf94015 and CSCvh77659",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "BID",
"id": "105427"
},
{
"db": "VULHUB",
"id": "VHN-118675"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-0473",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-19-094-03",
"trust": 2.8
},
{
"db": "BID",
"id": "105427",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1041737",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-20260",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2018.2903.2",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.1153",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-19-094-02",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-118675",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "VULHUB",
"id": "VHN-118675"
},
{
"db": "BID",
"id": "105427"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"id": "VAR-201810-0345",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "VULHUB",
"id": "VHN-118675"
}
],
"trust": 1.3775939099999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
}
]
},
"last_update_date": "2023-12-18T12:01:10.091000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20180926-ptp",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ptp"
},
{
"title": "Cisco IOS Software PrecisionTimeProtocol denies service patch vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/141457"
},
{
"title": "Multiple Cisco product IOS Software Precision Time Protocol Fixes for Subsystem Resource Management Error Vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=85264"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-399",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-118675"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "NVD",
"id": "CVE-2018-0473"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ptp"
},
{
"trust": 2.9,
"url": "http://www.securityfocus.com/bid/105427"
},
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-094-03"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1041737"
},
{
"trust": 0.9,
"url": "http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0473"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-0473"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-094-02"
},
{
"trust": 0.6,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ir800-memwrite"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2018.2903.2/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/78478"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "VULHUB",
"id": "VHN-118675"
},
{
"db": "BID",
"id": "105427"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"db": "VULHUB",
"id": "VHN-118675"
},
{
"db": "BID",
"id": "105427"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-09-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"date": "2018-10-05T00:00:00",
"db": "VULHUB",
"id": "VHN-118675"
},
{
"date": "2018-09-26T00:00:00",
"db": "BID",
"id": "105427"
},
{
"date": "2019-02-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"date": "2018-10-05T14:29:05.137000",
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"date": "2018-09-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-09-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-20260"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-118675"
},
{
"date": "2019-04-05T07:00:00",
"db": "BID",
"id": "105427"
},
{
"date": "2019-04-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013054"
},
{
"date": "2019-10-03T00:03:26.223000",
"db": "NVD",
"id": "CVE-2018-0473"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco IOS Software resource management vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013054"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201809-1255"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.