A vulnerability in the Smart Install feature of Cisconbsp;IOS Software and Cisconbsp;IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of servicenbsp;(DoS) condition.
The vulnerability is due to improper validation of packet data.
An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786.
Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.
Smart Install client functionality is enabled by default on switches that are running Cisconbsp;IOS Software releases that have not been updated to address Cisco bug IDnbsp;CSCvd36820.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smiThis advisory is part of the March 28, 2018, release of the Cisconbsp;IOS and IOSnbsp;XE Software Security Advisory Bundled Publication, which includes 20 Cisco Security Advisories that describe 22 vulnerabilities.
For a complete list of the advisories and links to them, see Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Security Impact Rating: High