{"vulnerability": "CVE-2018-0156", "sightings": [{"uuid": "de1f8547-a4a8-47df-a20e-c8e38e551939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-0156", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/bd758dbf-01de-4ff7-bd73-a050ba0f19b3", "content": "", "creation_timestamp": "2026-02-02T12:28:13.753490Z"}, {"uuid": "6f9ceb8f-6e9e-4cb0-b194-fc9fa4b8fa33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-0156", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "3aeffac1-445e-45cd-abfd-021926f8d0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-0156", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971339", "content": "", "creation_timestamp": "2024-12-24T20:27:51.056258Z"}, {"uuid": "5bc69edb-a0e0-426d-a3e5-535edd74f611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-0156", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/bd758dbf-01de-4ff7-bd73-a050ba0f19b3", "content": "", "creation_timestamp": "2026-02-02T12:28:13.753490Z"}, {"uuid": "cedbd1d6-f65c-469c-b568-a2ea193408ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-0156", "type": "seen", "source": "https://t.me/arpsyndicate/1154", "content": "#ExploitObserverAlert\n\nCVE-2018-0156\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2018-0156. A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.\n\nFIRST-EPSS: 0.005100000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-04T08:08:04.000000Z"}, {"uuid": "54111170-7838-40a8-af6a-836c8597e0ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-0156", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:17.000000Z"}]}