U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-0173

Change History

Initial Analysis by NIST 4/23/2018 4:37:42 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:ios:denali-16.3.4:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:denali-16.3.4:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_1000_series_route_processor_\(rp2\):-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_1000_series_route_processor_\(rp3\):-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:ios:denali-16.3.4:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:denali-16.3.4:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Added CWE

								
							
							
						
CWE-20
Changed Reference Type
http://www.securityfocus.com/bid/103545 No Types Assigned
http://www.securityfocus.com/bid/103545 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1040591 No Types Assigned
http://www.securitytracker.com/id/1040591 Third Party Advisory, VDB Entry
Changed Reference Type
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 No Types Assigned
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 Third Party Advisory, US Government Resource
Changed Reference Type
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 No Types Assigned
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 Third Party Advisory, US Government Resource
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2 No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2 Vendor Advisory
Changed Reference Type
https://www.tenable.com/security/research/tra-2018-06 No Types Assigned
https://www.tenable.com/security/research/tra-2018-06 Third Party Advisory