INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h
Vulnerabilities

CVE-2018-0161

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco IOS Software Resource Management Errors Vulnerability — A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Cataly
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco IOS Software Resource Management Errors Vulnerability — A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial-of-service (DoS) condition.

🤖 AI Executive Summary

CVE-2018-0161 is a critical vulnerability (CVSS 9.0) in the SNMP subsystem of Cisco IOS Software running on certain Cisco Catalyst Switches that allows an authenticated remote attacker to cause a denial-of-service (DoS) condition through resource management errors. An exploit is publicly available, significantly increasing the risk of active exploitation. Despite requiring authentication, the widespread deployment of Cisco Catalyst switches in enterprise networks makes this vulnerability particularly dangerous. A patch is available from Cisco and should be applied immediately.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 9, 2026 13:07
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations given the extensive deployment of Cisco Catalyst switches across all major sectors. Banking institutions regulated by SAMA, government entities under NCA oversight, energy companies including ARAMCO and its subsidiaries, telecom providers like STC, Mobily, and Zain, and healthcare organizations all heavily rely on Cisco infrastructure. A successful DoS attack on core network switches could disrupt critical services, financial transactions, and operational technology networks. The availability of a public exploit combined with SNMP being commonly enabled on managed switches increases the likelihood of exploitation in Saudi enterprise environments.
🏢 Affected Saudi Sectors
Banking Government Energy Telecommunications Healthcare Education Retail Transportation
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Apply the Cisco IOS security patch immediately from Cisco's Security Advisory portal for all affected Catalyst switch models.
2. Identify all Cisco Catalyst switches running vulnerable IOS versions using network inventory tools.

Compensating Controls (if immediate patching is not possible):
1. Restrict SNMP access using ACLs to only authorized management stations.
2. Use SNMPv3 with strong authentication credentials instead of SNMPv1/v2c.
3. Change default SNMP community strings immediately.
4. Implement network segmentation to isolate management plane traffic.
5. Disable SNMP on switches where it is not required.

Detection Rules:
1. Monitor for unusual SNMP traffic patterns or high-volume SNMP requests targeting Catalyst switches.
2. Configure SNMP trap monitoring for device reloads or resource exhaustion events.
3. Implement IDS/IPS signatures for CVE-2018-0161 exploit patterns.
4. Monitor switch CPU and memory utilization for anomalies.
5. Review SNMP access logs for unauthorized source IPs.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تصحيح أمان Cisco IOS فوراً من بوابة استشارات الأمان الخاصة بـ Cisco لجميع طرازات محولات Catalyst المتأثرة.
2. تحديد جميع محولات Cisco Catalyst التي تعمل بإصدارات IOS المعرضة للخطر باستخدام أدوات جرد الشبكة.

الضوابط التعويضية (في حال عدم إمكانية التصحيح الفوري):
1. تقييد الوصول إلى SNMP باستخدام قوائم التحكم في الوصول (ACL) للسماح فقط لمحطات الإدارة المصرح بها.
2. استخدام SNMPv3 مع بيانات اعتماد مصادقة قوية بدلاً من SNMPv1/v2c.
3. تغيير سلاسل مجتمع SNMP الافتراضية فوراً.
4. تنفيذ تجزئة الشبكة لعزل حركة مرور مستوى الإدارة.
5. تعطيل SNMP على المحولات التي لا تحتاج إليه.

قواعد الكشف:
1. مراقبة أنماط حركة مرور SNMP غير العادية أو طلبات SNMP عالية الحجم التي تستهدف محولات Catalyst.
2. تكوين مراقبة تنبيهات SNMP لأحداث إعادة تشغيل الأجهزة أو استنفاد الموارد.
3. تنفيذ توقيعات IDS/IPS لأنماط استغلال CVE-2018-0161.
4. مراقبة استخدام المعالج والذاكرة في المحولات للكشف عن الحالات الشاذة.
5. مراجعة سجلات الوصول إلى SNMP للكشف عن عناوين IP غير مصرح بها.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Network Security) ECC-2:3-4 (Patch Management) ECC-2:5-2 (Vulnerability Management) ECC-2:3-6 (Infrastructure Security)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.4 (Patch Management) 3.3.7 (Vulnerability Management) 3.4.1 (Incident and Threat Management)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.20 (Networks security) A.8.21 (Security of network services)
🟣 PCI DSS v4.0
PCI DSS 6.3.3 (Patching security vulnerabilities) PCI DSS 1.3 (Network access controls) PCI DSS 11.5 (Network intrusion detection)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:IOS Software
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.67%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-17
Published 2022-03-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.