{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T19:52:52.516","vulnerabilities":[{"cve":{"id":"CVE-2018-0418","sourceIdentifier":"psirt@cisco.com","published":"2018-08-15T20:29:01.017","lastModified":"2024-11-21T03:38:11.260","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Local Packet Transport Services (LPTS) feature set of Cisco ASR 9000 Series Aggregation Services Router Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input and validation checking on certain Precision Time Protocol (PTP) ingress traffic to an affected device. An attacker could exploit this vulnerability by injecting malformed traffic into an affected device. A successful exploit could allow the attacker to cause services on the device to become unresponsive, resulting in a DoS condition. Cisco Bug IDs: CSCvj22858."},{"lang":"es","value":"Una vulnerabilidad en el paquete de características Local Packet Transport Services (LPTS) de Cisco ASR 9000 Series Aggregation Services Router Software podría permitir que un atacante remoto no autenticado cree una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a la falta de comprobaciones de entradas y validación en cierto tráfico entrante PTP (Precision Time Protocol) en un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad inyectando tráfico mal formado en un dispositivo afectado. Si se explota con éxito, podría permitir que el atacante consiga que los servicios del dispositivo se reinicien, provocando una denegación de servicio (DoS). Cisco Bug IDs: CSCvj22858."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*","versionEndIncluding":"6.3.3_base","matchCriteriaId":"7C849A02-E9C9-455A-8F4F-1562169183E2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*","matchCriteriaId":"71BD158E-71D8-4DCA-8C09-F8AB7EF0EBDD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*","matchCriteriaId":"324C97E6-1810-404F-9F45-6240F99FF039"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*","matchCriteriaId":"57EB55BB-41B7-40A1-B6F5-142FE8AB4C16"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*","matchCriteriaId":"433F4A82-04A4-4EAA-8C19-F7581DCD8D29"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*","matchCriteriaId":"2D5E60AB-94FF-448A-89D8-5D2197E21C74"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*","matchCriteriaId":"A93212A4-50AB-42E7-89A4-5FBBAEA050C3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*","matchCriteriaId":"EDA53A61-98B3-458C-8893-61CD7D6B1E48"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*","matchCriteriaId":"F396564E-B477-4A27-A189-CEB737552E25"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*","matchCriteriaId":"5445CC54-ACFB-4070-AF26-F91FEAA85181"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*","matchCriteriaId":"D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105185","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041538","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-asr-ptp-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105185","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041538","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-asr-ptp-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}