{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T08:18:56.338","vulnerabilities":[{"cve":{"id":"CVE-2018-0378","sourceIdentifier":"psirt@cisco.com","published":"2018-10-17T21:49:52.787","lastModified":"2024-11-21T03:38:06.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of protection against PTP frame flood attacks. An attacker could exploit this vulnerability by sending large streams of malicious IPv4 or IPv6 PTP traffic to the affected device. A successful exploit could allow the attacker to cause a DoS condition, impacting the traffic passing through the device."},{"lang":"es","value":"Una vulnerabilidad en la característica Precision Time Protocol (PTP) de Cisco Nexus 5500, 5600 y 6000 Series Switches que ejecutan Cisco NX-OS Software podría permitir que un atacante remoto no autenticado cree una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a la falta de protección contra ataques de inundación de tramas PTP. Un atacante podría explotar esta vulnerabilidad enviando grandes flujos de tráfico PTP IPv4 o IPv6 malicioso al dispositivo afectado. Su explotación con éxito podría permitir que un atacante provoque una denegación de servicio (DoS), lo que impacta en el tráfico que pasa a través del dispositivo."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(0.8\\):*:*:*:*:*:*:*","matchCriteriaId":"E550EE1A-F746-48A9-B767-60761CDED37A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*","matchCriteriaId":"E5519EA9-1236-4F51-9974-E3FC1B26B5D2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*","matchCriteriaId":"CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*","matchCriteriaId":"1766443C-1C5A-486E-A36F-D3045F364D78"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*","matchCriteriaId":"DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*","matchCriteriaId":"ABB6E612-4246-4408-B3F6-B31E771F5ACB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*","matchCriteriaId":"91B129B2-2B31-4DE0-9F83-CC6E0C8729A0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*","matchCriteriaId":"3CBD3CD0-B542-4B23-9C9D-061643BE44E8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*","matchCriteriaId":"A22A2647-A4C0-4681-BBC5-D95ADBAA0457"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*","matchCriteriaId":"367C2A49-4C4D-471B-9B34-AFAFA5AE9503"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*","matchCriteriaId":"B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*","matchCriteriaId":"A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*","matchCriteriaId":"4F557E38-09F6-42C6-BABA-3C3168B38BBA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105669","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041920","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nexus-ptp-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105669","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041920","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nexus-ptp-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}