U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-0175

Change History

Modified Analysis by NIST 7/24/2024 10:10:41 AM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Removed CVSS V3
NIST AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

								
						
Changed CPE Configuration
AND
     OR
          *cpe:2.3:o:cisco:ios:15.4\(3\)m4.1:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:15.4\(3\)m4.1:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xr:15.4\(3\)m4.1:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900_services_router:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 15.2\(4a\)ea5
          *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 15.2\(4a\)ea5
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300_industrial_managed_ethernet_switch:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 15.2\(6\)e0a
          *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 15.2\(6\)e0a
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 15.6.3m1
          *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 15.6.3m1
     OR
          cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900_services_router:-:*:*:*:*:*:*:*
Changed Reference Type
http://www.securityfocus.com/bid/103564 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/103564 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1040586 Third Party Advisory, VDB Entry
http://www.securitytracker.com/id/1040586 Broken Link, Third Party Advisory, VDB Entry