{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:32:34.292","vulnerabilities":[{"cve":{"id":"CVE-2018-0395","sourceIdentifier":"psirt@cisco.com","published":"2018-10-17T19:29:00.303","lastModified":"2024-11-21T03:38:08.380","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Link Layer Discovery Protocol (LLDP) implementation for Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition when the device unexpectedly reloads. The vulnerability is due to improper input validation of certain type, length, value (TLV) fields of the LLDP frame header. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface on the targeted device. A successful exploit could allow the attacker to cause the switch to reload unexpectedly."},{"lang":"es","value":"Una vulnerabilidad en la implementación LLDP (Link Layer Discovery Protocol) para Cisco FXOS Software y Cisco NX-OS Software podría permitir que un atacante adyacente no autenticado cree una condición de denegación de servicio (DoS) cuando el dispositivo se recarga inesperadamente. Esta vulnerabilidad se debe a una validación incorrecta de entradas de determinados campos type, length y value (TLV) de la cabecera de la trama LLDP. Un atacante podría explotar esta vulnerabilidad enviando un paquete LLDP a una interfaz del dispositivo objetivo. Su explotación con éxito podría permitir que el atacante provoque el reinicio inesperado del switch."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:N/I:N/A:P","baseScore":2.9,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":5.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:6.0\\(4\\):*:*:*:*:*:*:*","matchCriteriaId":"A967FB72-BCEB-4A76-A322-DDB0C4094E7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:6.1\\(3\\)s2:*:*:*:*:*:*:*","matchCriteriaId":"60DD88C1-F02E-497C-BAAF-D52B5A9A6224"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"B22B3865-30E9-4B5A-A37D-DC33F1150FFE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"459A7F11-52BF-4AD6-B495-4C4D6C050493"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"FEACA55F-4335-4478-B608-EB92EE1D6C6D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"E5ABB175-81BE-4C46-BD2D-70016508BE22"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"71F93299-A715-4E97-87FE-B1E248EA98BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"3D71B228-FFE5-45F7-ADCF-6D359ADA6D31"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"9F3AD807-5A0F-4DF5-9A7A-748205F409E7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:firepower_extensible_operating_system:r231:*:*:*:*:*:*:*","matchCriteriaId":"EC52EFF8-C5A8-4530-B3F5-03BCC023D6AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:r231:*:*:*:*:*:*:*","matchCriteriaId":"883FB3A5-8C8C-41E5-ACA5-F75B4597076A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*","matchCriteriaId":"07DAFDDA-718B-4B69-A524-B0CEB80FE960"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:12.3\\(1e\\):*:*:*:*:*:*:*","matchCriteriaId":"94E4F174-8F51-41AF-82C7-0CA577753191"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*","matchCriteriaId":"07DAFDDA-718B-4B69-A524-B0CEB80FE960"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:3.2\\(3d\\)c:*:*:*:*:*:*:*","matchCriteriaId":"484C51B0-CA59-4E7C-B4E7-454AFF5F75F9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs:-:*:*:*:*:*:*:*","matchCriteriaId":"6166A0C7-D633-4835-88DB-B60E5B1AA818"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105674","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041919","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-fxnx-os-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105674","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041919","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-fxnx-os-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}