...
A vulnerability in the Switch Integrated Security Features of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an interface queue wedge. The vulnerability is due to incorrect handling of crafted IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv6 packets through the device. An exploit could allow the attacker to cause an interface queue wedge. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-sisf
See Advisory for Affected Products and Conditions.
There are no workarounds that address this vulnerability. However, it is possible to increase the input queue to a higher value until the source of the issue is identified or the device is upgraded.
The following tables list the First Fixed Release for the most prevalent Cisco IOS or Cisco IOS XE software releases currently deployed by Cisco customers. If there is no First Fixed Release information for a release you're currently running, please open a case with your support organization to request the most up-to-date information for your environment. Please DO NOT contact the Cisco PSIRT to request fix information. +---------+---------------------------------------------------------+ | Train | First Fixed Release | +---------+---------------------------------------------------------+ | 15.2E | 15.2(2)E8, 15.2(4)E6, 15.2(6)E | | 15.4S | 15.4(3)S9 | | 15.5M | Not vulnerable | | 15.5S | 15.5(3)S7 | | 15.5SY | 15.5(1)SY1 | +---------+---------------------------------------------------------+ +---------+---------------------------------------------------------+ | Train | First Fixed Release | +---------+---------------------------------------------------------+ | 3.6E | 3.6.8E | | 3.8E | 3.8.6E | | 3.13S | 3.13.9S | | 3.16S | 3.16.7S | | 16.3 | 16.3.6 | | 16.6 | Not vulnerable | +---------+---------------------------------------------------------+ PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 6.8: https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X CVE ID CVE-2018-0164 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html