CVE-2018-0472
moderate-risk
Published 2018-10-05
A vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to improper processing of malformed IPsec Authentication Header (AH) or Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by sending malformed IPsec packets to be processed by an affected device. An exploit could allow the attacker to cause a reload of the affected device.
Do I need to act?
!
14.9% chance of exploitation in next 30 days
EPSS score — higher than 85% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (10)
Third Party Advisory
http://www.securityfocus.com/bid/105418
Third Party Advisory
http://www.securitytracker.com/id/1041735
Third Party Advisory
http://www.securitytracker.com/id/1041737
Third Party Advisory
http://www.securityfocus.com/bid/105418
Third Party Advisory
http://www.securitytracker.com/id/1041735
Third Party Advisory
http://www.securitytracker.com/id/1041737
48
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
12/34 · Low
Exposure
7/34 · Low