Loading HuntDB...

CVE-2018-0171

UNKNOWN
Published 2018-03-28T22:00:00.000Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2018-0171. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.

Available Exploits

Cisco Smart Install - Configuration Download

Checks if TFTP service becomes available after Smart Install exploitation. This template should be run after the configuration extraction payload to verify that the device is now serving configuration files via TFTP.

ID: CVE-2018-0171
Author: ritikchaddha Critical

Related News

Russian threat actors using old Cisco bug to target critical infrastructure orgs

A threat group linked to the Russian Federal Security Service’s (FSB) Center 16 unit has been compromising unpatched and end-of-life Cisco networking devices via an old vulnerability (CVE-2018-0171), the FBI and Cisco warned on Wednesday. “Primary targets inc…

Help Net Security 2025-08-21 15:00
Russian Espionage Group Static Tundra Targets Legacy Cisco Flaw

Russian state-backed hackers are exploiting a seven-year-old Cisco Smart Install vulnerability (CVE-2018-0171) in end-of-life devices, prompting warnings from the FBI and Cisco Talos

Infosecurity Magazine 2025-08-21 14:20
Seven Years Later: Cisco CVE-2018-0171 Still Exposes Thousands to RCE

In a deep dive published by Guy Bruneau, Senior Security Consultant and former network engineer, the lingering dangers The post Seven Years Later: Cisco CVE-2018-0171 Still Exposes Thousands to RCE appeared first on Daily CyberSecurity.

SecurityOnline.info 2025-04-10 02:00
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telec…

Internet 2025-02-21 07:38

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

May 3, 2022

Added to KEV

November 3, 2021

Required Action

Apply updates per vendor instructions.

Affected Product

Vendor/Project: Cisco
Product: IOS and IOS XE

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-4w6g-87mh-x63x

Advisory Details

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: May 13, 2022, Modified: May 13, 2022

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

4 posts
Reddit 2 weeks, 1 day ago
technadu
Exploit

CISA Issues Global Warning on Chinese State-Sponsored Espionage Campaign A coalition of cybersecurity agencies (U.S., U.K., AU, CA, NZ) has released **Advisory AA25-239A**, detailing a **major cyber espionage operation** attributed to **Chinese state-sponsored actors**. 📌 Key details: * Target sectors: **Telecom, government, transportation**. * Countries affected: U.S., U.K., Australia, Canada, …

2
3
8.0
View Original High Risk
Reddit 3 weeks, 1 day ago
technadu

The FBI has issued a warning about a Russian state-sponsored cyber espionage campaign targeting critical infrastructure worldwide. 🔎 **Details:** * Vulnerability: CVE-2018-0171, Cisco Smart Install (unpatched since 2018) * Group: “Static Tundra,” attributed to FSB Center 16 * Attack methods: exploiting SNMP, GRE tunneling, config tampering for persistence * Targets: …

Reddit 3 weeks, 1 day ago
technadu

Top Cybersecurity News **Orange Belgium:** 850K customer records exposed (SIM IDs, PUKs, tariffs). Warlock hackers leaked data. **Russia’s Static Tundra:** FBI + Cisco Talos warn of exploitation of CVE-2018-0171 in global critical infra. Unpatched, EOL Cisco devices remain a prime target. **Scattered Spider:** Hacker Noah Urban sentenced to 10 years …

Reddit 3 weeks, 1 day ago
systemtek-co-uk

Continued exploitation of Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability (CVE-2018-0171)

References

Published: 2018-03-28T22:00:00.000Z
Last Modified: 2025-07-28T19:48:42.500Z
Copied to clipboard!