U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-0167

Change History

Modified Analysis by NIST 7/24/2024 10:22:37 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Removed CVSS V3
NIST AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

								
						
Changed CPE Configuration
AND
     OR
          *cpe:2.3:o:cisco:ios:5.2.0.base:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:5.2.0.base:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 15.6.3m1
          *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 15.6.3m1
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*
Changed CPE Configuration
AND
     OR
          *cpe:2.3:o:cisco:ios:5.2.0.base:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:5.2.0.base:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xr:5.2.0.base:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:o:cisco:ios:5.2.0.base:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:5.2.0.base:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* versions from (including) 4.1 up to (excluding) 5.1.3
     OR
          cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 15.2\(4a\)ea5
          *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 15.2\(4a\)ea5
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 15.2\(6\)e0a
          *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 15.2\(6\)e0a
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
Changed Reference Type
http://www.securityfocus.com/bid/103564 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/103564 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1040586 Third Party Advisory, VDB Entry
http://www.securitytracker.com/id/1040586 Broken Link, Third Party Advisory, VDB Entry