
====================================================================

                             CERT-Renater

                 Note d'Information No. 2018/VULN119
_____________________________________________________________________

DATE                : 29/03/2018

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco IOS, Cisco IOS XE.

=====================================================================
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682
_____________________________________________________________________


Cisco Security Advisory: Cisco IOS Software Simple Network Management
Protocol GET MIB Object ID Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-snmp

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0161

CVSS Score v(3): 7.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Simple Network Management Protocol (SNMP)
subsystem of Cisco IOS Software running on certain models of Cisco
Catalyst Switches could allow an authenticated, remote attacker to
cause a denial of service (DoS) condition.

The vulnerability is due to a condition that could occur when the
affected software processes an SNMP read request that contains a
request for the ciscoFlashMIB object ID (OID). An attacker could
trigger this vulnerability by issuing an SNMP GET request for the
ciscoFlashMIB OID on an affected device. A successful exploit could
cause the affected device to restart due to a SYS-3-CPUHOG.

Cisco has released software updates that address this vulnerability.
There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software Web UI Remote Access
Privilege Escalation Vulnerability

Advisory ID: cisco-sa-20180328-xepriv

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0152

CVSS Score v(3): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the web-based user interface (web UI) of Cisco IOS
XE Software could allow an authenticated, remote attacker to gain
elevated privileges on an affected device.

The vulnerability exists because the affected software does not reset
the privilege level for each web UI session. An attacker who has valid
credentials for an affected device could exploit this vulnerability by
remotely accessing a VTY line to the device. A successful exploit could
allow the attacker to access an affected device with the privileges of
the user who previously logged in to the web UI.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software Zone-Based Firewall IP
Fragmentation Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-fwip

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0157

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Zone-Based Firewall code of Cisco IOS XE
Software could allow an unauthenticated, remote attacker to cause a
device to reload.

The vulnerability is due to the way fragmented packets are handled in
the firewall code. An attacker could exploit this vulnerability by
sending fragmented IP Version 4 or IP Version 6 packets through an
affected device. An exploit could allow the attacker to cause the
device to crash, resulting in a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"]
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Internet Key
Exchange Memory Leak Vulnerability

Advisory ID: cisco-sa-20180328-ike

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0158

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module
of Cisco IOS Software and Cisco IOS XE Software could allow an
unauthenticated, remote attacker to cause a memory leak or a reload of
an affected device that leads to a denial of service (DoS) condition.

The vulnerability is due to incorrect processing of certain IKEv2
packets. An attacker could exploit this vulnerability by sending
crafted IKEv2 packets to an affected device to be processed. A
successful exploit could cause an affected device to continuously
consume memory and eventually reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software for Cisco Catalyst
Switches IPv4 Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-ipv4

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0177

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS
XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650
Series Switches could allow an unauthenticated, remote attacker to
cause high CPU utilization, traceback messages, or a reload of an
affected device that leads to a denial of service (DoS) condition.

The vulnerability is due to incorrect processing of certain IPv4
packets. An attacker could exploit this vulnerability by sending
specific IPv4 packets to an IPv4 address on an affected device. A
successful exploit could allow the attacker to cause high CPU
utilization, traceback messages, or a reload of the affected device
that leads to a DoS condition. If the switch does not reboot when under
attack, it would require manual intervention to reload the device.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install
Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-smi

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0156

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Smart Install feature of Cisco IOS Software and
Cisco IOS XE Software could allow an unauthenticated, remote attacker
to trigger a reload of an affected device, resulting in a denial of
service (DoS) condition.

The vulnerability is due to improper validation of packet data. An
attacker could exploit this vulnerability by sending a crafted packet
to an affected device on TCP port 4786.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install
Remote Code Execution Vulnerability

Advisory ID: cisco-sa-20180328-smi2

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0171

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Smart Install feature of Cisco IOS Software and
Cisco IOS XE Software could allow an unauthenticated, remote attacker
to trigger a reload of an affected device, resulting in a denial of
service (DoS) condition, or to execute arbitrary code on an affected
device.

The vulnerability is due to improper validation of packet data. An
attacker could exploit this vulnerability by sending a crafted Smart
Install message to an affected device on TCP port 4786. A successful
exploit could allow the attacker to cause a buffer overflow on the
affected device, which could have the following impacts:

Triggering a reload of the device
Allowing the attacker to execute arbitrary code on the device
Causing an indefinite loop on the affected device that triggers a
watchdog crash

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2"]

This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Bidirectional
Forwarding Detection Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-bfd

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0155

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Bidirectional Forwarding Detection (BFD) offload
implementation of Cisco Catalyst 4500 Series Switches and Cisco
Catalyst 4500-X Series Switches could allow an unauthenticated, remote
attacker to cause a crash of the iosd process, causing a denial of
service (DoS) condition.

The vulnerability is due to insufficient error handling when the BFD
header in a BFD packet is incomplete. An attacker could exploit this
vulnerability by sending a crafted BFD message to or across an affected
switch. A successful exploit could allow the attacker to trigger a
reload of the system.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software Internet Group
Management Protocol Memory Leak Vulnerability

Advisory ID: cisco-sa-20180328-igmp

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0165

CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Internet Group Management Protocol (IGMP)
packet-processing functionality of Cisco IOS XE Software could allow an
unauthenticated, adjacent attacker to exhaust buffers on an affected
device, resulting in a denial of service (DoS) condition.

The vulnerability is due to the affected software insufficiently
processing IGMP Membership Query packets that are sent to an affected
device. An attacker could exploit this vulnerability by sending a large
number of IGMP Membership Query packets, which contain certain values,
to an affected device. A successful exploit could allow the attacker to
exhaust buffers on the affected device, resulting in a DoS condition
that requires the device to be reloaded manually.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software User EXEC Mode Root
Shell Access Vulnerabilities

Advisory ID: cisco-sa-20180328-privesc1

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0169, CVE-2018-0176

CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software
could allow an authenticated, local attacker to gain access to the
underlying Linux shell of an affected device and execute arbitrary
commands with root privileges on the device.

The vulnerabilities are due to the affected software improperly
sanitizing command arguments to prevent access to internal data
structures on a device. An attacker who has user EXEC mode (privilege
level 1) access to an affected device could exploit these
vulnerabilities on the device by executing CLI commands that contain
crafted arguments. A successful exploit could allow the attacker to
gain access to the underlying Linux shell of the affected device and
execute arbitrary commands with root privileges on the device.

Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Quality of
Service Remote Code Execution Vulnerability

Advisory ID: cisco-sa-20180328-qos

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0151

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the quality of service (QoS) subsystem of Cisco IOS
Software and Cisco IOS XE Software could allow an unauthenticated,
remote attacker to cause a denial of service (DoS) condition or execute
arbitrary code with elevated privileges.

The vulnerability is due to incorrect bounds checking of certain values
in packets that are destined for UDP port 18999 of an affected device.
An attacker could exploit this vulnerability by sending malicious
packets to an affected device. When the packets are processed, an
exploitable buffer overflow condition may occur. A successful exploit
could allow the attacker to execute arbitrary code on the affected
device with elevated privileges. The attacker could also leverage this
vulnerability to cause the device to reload, causing a temporary DoS
condition while the device is reloading.

The malicious packets must be destined to and processed by an affected
device. Traffic transiting a device will not trigger the vulnerability.

Cisco has released software updates that address this vulnerability.
There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS, IOS XE, and IOS XR Software Link
Layer Discovery Protocol Buffer Overflow Vulnerabilities

Advisory ID: cisco-sa-20180328-lldp

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0167, CVE-2018-0175

CVSS Score v(3): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP)
subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS
XR Software could allow an unauthenticated, adjacent attacker to cause
a denial of service (DoS) condition or execute arbitrary code with
elevated privileges on an affected device.

For more information about these vulnerabilities, see the Details
["#details"] section of this advisory.

Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp"]

This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software with Cisco Umbrella
Integration Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-opendns-dos

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0170

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Cisco Umbrella Integration feature of Cisco IOS
XE Software could allow an unauthenticated, remote attacker to cause a
denial of service (DoS) condition.

The vulnerability is due to a logic error that exists when handling a
malformed incoming packet, leading to access to an internal data
structure after it has been freed. An attacker could exploit this
vulnerability by sending crafted, malformed IP packets to an affected
device. A successful exploit could allow the attacker to cause an
affected device to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos"]

This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Internet Key
Exchange Version 1 Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-ike-dos

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0159

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the implementation of Internet Key Exchange Version
1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software
could allow an unauthenticated, remote attacker to cause an affected
device to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to improper validation of specific IKEv1
packets. An attacker could exploit this vulnerability by sending
crafted IKEv1 packets to an affected device during an IKE negotiation.
A successful exploit could allow the attacker to cause an affected
device to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"]

This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software Simple Network
Management Protocol Double-Free Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-snmp-dos

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0160

CVSS Score v(3): 7.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in Simple Network Management Protocol (SNMP) subsystem
of Cisco IOS XE Software could allow an authenticated, remote attacker
to cause a denial of service (DoS) condition.

The vulnerability is due to improper management of memory resources,
referred to as a double free. An attacker could exploit this
vulnerability by sending crafted SNMP packets to an affected device. A
successful exploit could allow the attacker to cause the affected
device to reload, resulting in a DoS condition.

To exploit this vulnerability via SNMP Version 2c or earlier, the
attacker must know the SNMP read-only community string for an affected
system. To exploit this vulnerability via SNMP Version 3, the attacker
must know the user credentials for the affected system.

Cisco has released software updates that address this vulnerability.
There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"]

This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS Software Integrated Services Module
for VPN Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-dos

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0154

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the crypto engine of the Cisco Integrated Services
Module for VPN (ISM-VPN) running Cisco IOS Software could allow an
unauthenticated, remote attacker to cause a denial of service (DoS)
condition on an affected device.

The vulnerability is due to insufficient handling of VPN traffic by the
affected device. An attacker could exploit this vulnerability by
sending crafted VPN traffic to an affected device. A successful exploit
could allow the attacker to cause the affected device to hang or crash,
resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS XE Software Static Credential
Vulnerability

Advisory ID: cisco-sa-20180328-xesc

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0150

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in Cisco IOS XE Software could allow an
unauthenticated, remote attacker to log in to a device running an
affected release of Cisco IOS XE Software with the default username and
password that are used at initial boot.

The vulnerability is due to an undocumented user account with privilege
level 15 that has a default username and password. An attacker could
exploit this vulnerability by using this account to remotely connect to
an affected device. A successful exploit could allow the attacker to
log in to the device with privilege level 15 access.

Cisco has released software updates that address this vulnerability.
There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software DHCP Version 4
Relay Heap Overflow Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-dhcpr1

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0172

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the DHCP option 82 encapsulation functionality of
Cisco IOS Software and Cisco IOS XE Software could allow an
unauthenticated, remote attacker to cause an affected device to reload,
resulting in a denial of service (DoS) condition.

The vulnerability exists because the affected software performs
incomplete input validation of option 82 information that it receives
in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker
could exploit this vulnerability by sending a crafted DHCPv4 packet to
an affected device. A successful exploit could allow the attacker to
cause a heap overflow condition on the affected device, which will
cause the device to reload and result in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software DHCP Version 4
Relay Reply Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-dhcpr2

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0173

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Cisco IOS Software and Cisco IOS XE Software
function that restores encapsulated option 82 information in DHCP
Version 4 (DHCPv4) packets could allow an unauthenticated, remote
attacker to cause an affected device to reload, resulting in a denial
of service (DoS) condition.

The vulnerability exists because the affected software performs
incomplete input validation of encapsulated option 82 information that
it receives in DHCPOFFER messages from DHCPv4 servers. An attacker
could exploit this vulnerability by sending a crafted DHCPv4 packet to
an affected device, which the device would then forward to a DHCPv4
server. When the affected software processes the option 82 information
that is encapsulated in the response from the server, an error could
occur. A successful exploit could allow the attacker to cause the
affected device to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software DHCP Version 4
Relay Denial of Service Vulnerability

Advisory ID: cisco-sa-20180328-dhcpr3

Revision: 1.0

For Public Release: 2018 March 28 16:00 GMT

Last Updated: 2018 March 28 16:00 GMT

CVE ID(s): CVE-2018-0174

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the DHCP option 82 encapsulation functionality of
Cisco IOS Software and Cisco IOS XE Software could allow an
unauthenticated, remote attacker to cause an affected device to reload,
resulting in a denial of service (DoS) condition.

The vulnerability exists because the affected software performs
incomplete input validation of option 82 information that it receives
in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker
could exploit this vulnerability by sending a crafted DHCPv4 packet to
an affected device. A successful exploit could allow the attacker to
cause the affected device to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3

["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3"]
This advisory is part of the March 28, 2018, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco
Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software
Security Advisory Bundled Publication
["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].

==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================







