Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0378— Cisco NX-OS Software for Nexus 5500, 5600, and 6000 Series Switches Precision Time Protocol Denial of Service Vulnerability

EPSS 1.40% · P81
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0378

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco NX-OS Software for Nexus 5500, 5600, and 6000 Series Switches Precision Time Protocol Denial of Service Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of protection against PTP frame flood attacks. An attacker could exploit this vulnerability by sending large streams of malicious IPv4 or IPv6 PTP traffic to the affected device. A successful exploit could allow the attacker to cause a DoS condition, impacting the traffic passing through the device.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Nexus 5500、5600和6000 Series交换机NX-OS Software 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Nexus 5500、5600和6000 Series Switches都是美国思科(Cisco)公司的不同系列的交换机产品。NX-OS Software是运行在其中的一套交换机使用的数据中心级操作系统软件。 Cisco Nexus 5500、5600和6000 Series交换机中的NX-OS Software的Precision Time Protocol (PTP)功能存在安全漏洞。远程攻击者可通过向受影响的设备发送大量恶意的IPv4或IPv6 PTP流量利用该漏洞造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco NX-OS Software for Nexus 6000 Series 6.0(2)N1(2) -

II. Public POCs for CVE-2018-0378

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0378

登录查看更多情报信息。

Same Patch Batch · Cisco · 2018-10-17 · 15 CVEs total

CVE-2018-0388Cisco Wireless LAN Controller Software Cross-Site Scripting Vulnerability
CVE-2018-0416Cisco Wireless LAN Controller Software Information Disclosure Vulnerability
CVE-2018-0395Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerabilit
CVE-2018-0456Cisco NX-OS Software Authenticated Simple Network Management Protocol Denial of Service Vu
CVE-2018-15395Cisco Wireless LAN Controller Software Privilege Escalation Vulnerability
CVE-2018-15402Cisco Enterprise NFV Infrastructure Software Cross-Site Request Forgery Vulnerability
CVE-2018-0417Cisco Wireless LAN Controller Software GUI Privilege Escalation Vulnerability
CVE-2018-0381Cisco Aironet 1560, 1800, 2800, and 3800 Series Access Points Denial of Service Vulnerabil
CVE-2018-0420Cisco Wireless LAN Controller Software Directory Traversal Vulnerability
CVE-2018-0441Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability
CVE-2018-0442Cisco Wireless LAN Controller Software Control and Provisioning of Wireless Access Points
CVE-2018-0443Cisco Wireless LAN Controller Software Control and Provisioning of Wireless Access Points
CVE-2018-15435Cisco SocialMiner Cross-Site Scripting Vulnerability
CVE-2018-15438Cisco Prime Collaboration Assurance Cross-Site Request Forgery Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2018-0378

No comments yet


Leave a comment