{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T23:56:47.813","vulnerabilities":[{"cve":{"id":"CVE-2018-0298","sourceIdentifier":"psirt@cisco.com","published":"2018-06-21T11:29:00.240","lastModified":"2024-11-21T03:37:55.500","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web UI of Cisco FXOS and Cisco UCS Fabric Interconnect Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected system. The vulnerability is due to incorrect input validation in the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP or HTTPS packet directed to the physical management interface of an affected system. A successful exploit could allow the attacker to cause the process to crash and possibly reload the device, resulting in a denial of service (DoS) condition on the affected system. This vulnerability affects Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvb61398, CSCvb86799."},{"lang":"es","value":"Una vulnerabilidad en la interfaz web de Cisco FXOS y Cisco UCS Fabric Interconnect Software podría permitir que un atacante remoto sin autenticar provoque un desbordamiento de búfer en un sistema afectado. Esta vulnerabilidad se debe a la incompleta validación de entradas en la interfaz web. Un atacante podría explotar esta vulnerabilidad enviando un paquete HTTP o HTTPS directamente a la interfaz de gestión física de un sistema afectado. Su explotación con éxito podría permitir que el atacante haga que el proceso se cierre inesperadamente y, posiblemente, que se reinicie el dispositivo, provocando una denegación de servicio (DoS) en el sistema afectado. esta vulnerabilidad afecta a Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, UCS 6200 Series Fabric Interconnects y UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvb61398, CSCvb86799."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0\\(2\\)","versionEndExcluding":"3.1\\(3a\\)a","matchCriteriaId":"96B9E0CF-5926-4DDB-9298-BADDD33B66D0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6120xp:-:*:*:*:*:*:*:*","matchCriteriaId":"FC6E3DFD-A811-4FD3-B888-ABCDEFCD3A4B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6140xp:-:*:*:*:*:*:*:*","matchCriteriaId":"C0246716-64E9-4CCA-9546-A3A40D375E95"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*","matchCriteriaId":"49112D3F-DFAD-4E71-992B-9E0640FA388C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*","matchCriteriaId":"38A1D8F2-A4A6-4BAC-8326-9F9DE9572FA2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*","matchCriteriaId":"B82093C6-B36D-4E4E-AD7F-8C107646B8D9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*","matchCriteriaId":"E406DDCE-6753-43E9-B6F0-7A038DE84E41"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1","versionEndExcluding":"1.1.4.169","matchCriteriaId":"63CFEFD0-F2F2-4220-903C-A11446902C4D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.0.1.135","matchCriteriaId":"2695D838-79D5-4C2F-8B41-0900AABAAE48"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*","matchCriteriaId":"A0CBC7F5-7767-43B6-9384-BE143FCDBD7F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*","matchCriteriaId":"38AE6DC0-2B03-4D36-9856-42530312CC46"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*","matchCriteriaId":"3DB2822B-B752-4CD9-A178-934957E306B4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*","matchCriteriaId":"65378F3A-777C-4AE2-87FB-1E7402F9EA1B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1","versionEndExcluding":"1.1.4.179","matchCriteriaId":"F5581E60-8144-4630-9545-8DC0B7AD44A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.0.1.153","matchCriteriaId":"ABA77B46-C30C-4427-9401-6500B6221ACE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*","matchCriteriaId":"0574E77C-18C6-4621-B73A-DCDD6D1B5E37"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxos-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxos-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}