CVE-2018-0372

Summary

CVECVE-2018-0372
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-07-18 23:29:00 UTC
Updated2019-10-09 23:31:00 UTC
DescriptionA vulnerability in the DHCPv6 feature of the Cisco Nexus 9000 Series Fabric Switches in Application-Centric Infrastructure (ACI) Mode could allow an unauthenticated, remote attacker to cause the device to run low on system memory, which could result in a Denial of Service (DoS) condition on an affected system. The vulnerability is due to improper memory management when DHCPv6 packets are received on an interface of the targeted device. An attacker could exploit this vulnerability by sending a high number of malicious DHCPv6 packets to be processed by an affected device. A successful exploit could allow the attacker to cause the system to run low on memory, which could cause an eventual reboot of an affected device. The vulnerability only applies to IPv6 protocol packets and not for IPv4 protocol packets. This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI Mode running software version 13.0(1k). The vulnerability can only be exploited when unicast routing is enabled on the Bridge Domain (BD). DHCP and DHCP relay do not have to be configured for the vulnerability to be exploited. Cisco Bug IDs: CSCvg38918.

Risk And Classification

Problem Types: CWE-400

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Cisco Nexus 92160yc-x - All All All
Hardware Cisco Nexus 92160yc-x - All All All
Hardware Cisco Nexus 92304qc - All All All
Hardware Cisco Nexus 92304qc - All All All
Hardware Cisco Nexus 9236c - All All All
Hardware Cisco Nexus 9236c - All All All
Hardware Cisco Nexus 9272q - All All All
Hardware Cisco Nexus 9272q - All All All
Hardware Cisco Nexus 93108tc-ex - All All All
Hardware Cisco Nexus 93108tc-ex - All All All
Hardware Cisco Nexus 93120tx - All All All
Hardware Cisco Nexus 93120tx - All All All
Hardware Cisco Nexus 93128tx - All All All
Hardware Cisco Nexus 93128tx - All All All
Hardware Cisco Nexus 93180yc-ex - All All All
Hardware Cisco Nexus 93180yc-ex - All All All
Hardware Cisco Nexus 9332pq - All All All
Hardware Cisco Nexus 9332pq - All All All
Hardware Cisco Nexus 9372px - All All All
Hardware Cisco Nexus 9372px - All All All
Hardware Cisco Nexus 9372tx - All All All
Hardware Cisco Nexus 9372tx - All All All
Hardware Cisco Nexus 9396px - All All All
Hardware Cisco Nexus 9396px - All All All
Hardware Cisco Nexus 9396tx - All All All
Hardware Cisco Nexus 9396tx - All All All
Hardware Cisco Nexus 9504 - All All All
Hardware Cisco Nexus 9504 - All All All
Hardware Cisco Nexus 9508 - All All All
Hardware Cisco Nexus 9508 - All All All
Hardware Cisco Nexus 9516 - All All All
Hardware Cisco Nexus 9516 - All All All
Hardware Cisco Nexus N9k-c9508-fm-r - All All All
Hardware Cisco Nexus N9k-c9508-fm-r - All All All
Hardware Cisco Nexus N9k-x9636c-r - All All All
Hardware Cisco Nexus N9k-x9636c-r - All All All
Hardware Cisco Nexus N9k-x9636q-r - All All All
Hardware Cisco Nexus N9k-x9636q-r - All All All
Operating System Cisco Nx-os 13.0(1k) All All All
Operating System Cisco Nx-os 13.0\(1k\) All All All
Operating System Cisco Nx-os 13.0\(1k\) All All All

References

ReferenceSourceLinkTags
Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode DHCP Version 6 Denial of Service Vulnerability CONFIRM tools.cisco.com Vendor Advisory
Cisco Nexus 9000 Series Fabric Switches in ACI Mode Lets Remote Users Consume Excessive Memory Resources - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report