CVE-2018-0171

CRITICAL
2018-03-28 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Jan 14, 2026 - 18:45 cisa
CISA KEV
PoC Detected
Jan 14, 2026 - 18:45 vuln.today
Public exploit code
CVE Published
Mar 28, 2018 - 22:29 nvd
CRITICAL 9.8

Description

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.

Analysis

Cisco IOS and IOS XE Smart Install feature allows unauthenticated remote attackers to trigger device reload or execute arbitrary code through crafted packets, widely exploited to disrupt network infrastructure.

Technical Context

The CWE-20 input validation flaw in Cisco's Smart Install protocol handler (TCP port 4786) allows specially crafted packets to trigger a stack-based buffer overflow. The vulnerability can be exploited for denial of service (device crash/reload) or, with more sophisticated payloads, for remote code execution.

Affected Products

['Cisco IOS Software with Smart Install enabled', 'Cisco IOS XE Software with Smart Install enabled']

Remediation

Disable Smart Install if not required: 'no vstack'. Apply Cisco security advisory patches. Implement infrastructure ACLs to restrict access to port 4786. Monitor for Smart Install protocol scanning.

Priority Score

222
Low Medium High Critical
KEV: +50
EPSS: +93.0
CVSS: +49
POC: +20

Share

CVE-2018-0171 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy