<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T13:02:56.247495+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/87a08fbc-d162-401a-8714-6cb0d6f2e8e6/export</id>
    <title>87a08fbc-d162-401a-8714-6cb0d6f2e8e6</title>
    <updated>2026-05-01T13:02:56.717845+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "87a08fbc-d162-401a-8714-6cb0d6f2e8e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CISCO-SA-20180328-SMI2", "type": "seen", "source": "https://t.me/information_security_channel/15590", "content": "Critical Flaw Exposes Many Cisco Devices to Remote Attacks\nhttp://feedproxy.google.com/~r/Securityweek/~3/4Q4ROpCwsY0/critical-flaw-exposes-many-cisco-devices-remote-attacks\n\nCisco has patched more than 30 vulnerabilities in its IOS software, including a critical remote code execution flaw that exposes hundreds of thousands \u2013 possibly millions \u2013 of devices to remote attacks launched over the Internet.\nA total of three vulnerabilities have been rated critical. One of them is CVE-2018-0171 (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2), an issue discovered by researchers at Embedi in the Smart Install feature in IOS and IOS XE software.\nAn unauthenticated attacker can send specially crafted Smart Install messages to an affected device on TCP port 4786 and cause it to enter a denial-of-service (DoS) condition or execute arbitrary code.\nCisco pointed out that Smart Install is enabled by default on switches that have not received a recent update for automatically disabling the feature when it\u2019s not in use.\nEmbedi has published a blog post (https://embedi.com/blog/cisco-smart-install-remote-code-execution/) detailing CVE-2018-0171 and how it can be exploited. Researchers initially believed the vulnerability could only be exploited by an attacker inside the targeted organization\u2019s network. However, an Internet scan revealed that there are roughly 250,000 vulnerable Cisco devices that have TCP port 4786 open.\nFurthermore, Embedi told SecurityWeek that it has identified approximately 8.5 million devices that use this port, but researchers have not been able to determine if the Smart Install technology is present on these systems.\nAnother IOS vulnerability patched by Cisco and rated critical is CVE-2018-0150, a backdoor (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc) that allows an attacker to remotely access a device. This security hole is introduced by the existence of an undocumented account with a default username and password. The credentials provide access to a device with privilege level 15, the highest level of access for Cisco network devices.\nThe last critical security hole  (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos)is CVE-2018-0151, which affects the quality of service (QoS) subsystem of IOS and IOS XE software. The flaw can allow a remote an unauthenticated attacker to cause a DoS condition or execute code with elevated privileges by sending malicious packets to a device.\nThe networking giant has patched a total of 17 high severity flaws in IOS and IOS XE software. The list includes mostly DoS issues, but some of the vulnerabilities can be exploited for remote code execution and privilege escalation.\nCisco also patched over a dozen IOS vulnerabilities rated \u201cmedium severity.\u201d A majority of the bugs were discovered by the company itself and there is no evidence that any of them have been exploited for malicious purposes.\nRelated: Cisco Patches Hard-coded Password in PCP Software (https://www.securityweek.com/cisco-patches-hard-coded-password-pcp-software)\nRelated: Cisco Reissues Patches for Critical Firewall Flaw (https://www.securityweek.com/cisco-reissues-patches-critical-firewall-flaw)\nRelated: Cisco Patches Flaws in Email Security, Other Products (https://www.securityweek.com/cisco-patches-flaws-email-security-other-products)", "creation_timestamp": "2018-03-30T12:01:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/87a08fbc-d162-401a-8714-6cb0d6f2e8e6/export"/>
    <published>2018-03-30T12:01:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a11ceb7d-868c-4660-9356-807313ddf96a/export</id>
    <title>a11ceb7d-868c-4660-9356-807313ddf96a</title>
    <updated>2026-05-01T13:02:56.717782+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a11ceb7d-868c-4660-9356-807313ddf96a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CISCO-SA-20180328-SMI2", "type": "seen", "source": "https://t.me/canyoupwnme/3491", "content": "Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2", "creation_timestamp": "2018-03-30T13:51:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a11ceb7d-868c-4660-9356-807313ddf96a/export"/>
    <published>2018-03-30T13:51:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/83677a2e-a20c-4e58-9ff5-43e8d5bd5f9f/export</id>
    <title>83677a2e-a20c-4e58-9ff5-43e8d5bd5f9f</title>
    <updated>2026-05-01T13:02:56.717689+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "83677a2e-a20c-4e58-9ff5-43e8d5bd5f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CISCO-SA-20180328-SMI2", "type": "published-proof-of-concept", "source": "https://t.me/sysadm_in_channel/221", "content": "\u041e\u043f\u043f\u0430.. \u0443 \u043a\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f Cisco \u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u0435\u0449\u0451 \u0433\u0434\u0435-\u0442\u043e, \u0435\u0441\u0442\u044c \u043f\u043e\u0432\u043e\u0434 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2\n\n\u0421\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u0430 \u0441 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u043c\u0438 PoC)) :\nhttps://embedi.com/blog/cisco-smart-install-remote-code-execution/", "creation_timestamp": "2018-04-06T03:17:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/83677a2e-a20c-4e58-9ff5-43e8d5bd5f9f/export"/>
    <published>2018-04-06T03:17:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6047b6e4-c680-4b18-8ef1-7da4f2bc5c65/export</id>
    <title>6047b6e4-c680-4b18-8ef1-7da4f2bc5c65</title>
    <updated>2026-05-01T13:02:56.714252+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6047b6e4-c680-4b18-8ef1-7da4f2bc5c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cisco-sa-20180328-smi2", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115062090544361275", "content": "", "creation_timestamp": "2025-08-20T16:42:51.314904Z"}</content>
    <link href="https://db.gcve.eu/sighting/6047b6e4-c680-4b18-8ef1-7da4f2bc5c65/export"/>
    <published>2025-08-20T16:42:51.314904+00:00</published>
  </entry>
</feed>
