PT-2018-1101 · Cisco · Cisco Ios +1
Published
2018-03-28
·
Updated
2025-08-28
·
CVE-2018-0171
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Cisco IOS and Cisco IOS XE Software (affected versions not specified)
**Description:**
A vulnerability exists in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software due to improper validation of packet data. This allows a remote, unauthenticated attacker to potentially trigger a device reload, leading to a denial-of-service (DoS) condition, or to execute arbitrary code on the affected device. Exploitation involves sending a crafted Smart Install message to TCP port 4786, which could cause a buffer overflow. The Static Tundra group, sponsored by the Russian state, and the Salt Typhoon group have been observed exploiting this vulnerability to gain access to telecommunications, education, and manufacturing sectors globally. These groups aim to establish persistent access and exfiltrate network traffic and device configurations.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
DoS
RCE
Memory Corruption
Related Identifiers
Affected Products
References · 44
- 🔥 https://github.com/AlrikRr/Cisco-Smart-Exploit⭐ 6 🔗 2 · Exploit
- 🔥 https://exploit-db.com/exploits/44451 · Exploit
- 🔥 https://embedi.com/blog/cisco-smart-install-remote-code-execution · Exploit
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2018-0171 · Security Note
- https://bdu.fstec.ru/vul/2018-00499 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2 · Vendor Advisory
- https://t.me/aptreports/16287 · Telegram Post
- https://twitter.com/EnigmaTyphoon/status/1906611680861188546 · Twitter Post
- https://twitter.com/freedomhack101/status/1961077547732529416 · Twitter Post
- https://twitter.com/EnigmaTyphoon/status/1906300578357014666 · Twitter Post
- https://darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490 · Note
- https://t.me/aptreports/21612 · Telegram Post
- https://t.me/pentestingnews/66642 · Telegram Post
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 · Note