
OPERATIONAL DEFECT DATABASE
...

...
A vulnerability in the Smart Install feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of the device, resulting in a Denial of Service (DoS) condition, or to execute arbitrary code on the affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to the affected device on TCP port 4786. An exploit could allow the attacker to cause a buffer overflow on the affected device triggering either a reload of the device or allowing the attacker to execute arbitrary code on the device, or to cause an indefinite loop on the affected device triggering a watchdog crash. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2
This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or IOS XE Software. See the published advisory for more information. Please see the Cisco IOS Software Checker tool for information on non-vulnerable, vulnerable and fixed releases. This tool is available at: https://tools.cisco.com/security/center/softwarechecker.x
Please refer to the security advisory.
Please refer to the security advisory. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 9.8: https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X CVE ID CVE-2018-0171 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Cisco Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.