INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h
Vulnerabilities

CVE-2018-0167

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco IOS, XR, and XE Software Buffer Overflow Vulnerability — There is a buffer overflow vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Softwa
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco IOS, XR, and XE Software Buffer Overflow Vulnerability — There is a buffer overflow vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software which could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code.

🤖 AI Executive Summary

CVE-2018-0167 is a critical buffer overflow vulnerability in the LLDP subsystem of Cisco IOS, IOS XE, and IOS XR Software, allowing an unauthenticated adjacent attacker to execute arbitrary code or cause denial of service. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses severe risk to network infrastructure. An attacker on the same Layer 2 network segment can send crafted LLDP packets to exploit vulnerable Cisco devices, potentially gaining full control of routers and switches. Organizations running unpatched Cisco networking equipment should treat this as an urgent priority.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 9, 2026 15:09
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability has significant impact across virtually all Saudi sectors due to the widespread deployment of Cisco networking equipment. The telecom sector (STC, Mobily, Zain) relies heavily on Cisco IOS XR for core routing infrastructure. Government networks under NCA oversight, ARAMCO and energy sector SCADA/OT networks, banking institutions regulated by SAMA, and healthcare facilities all extensively use Cisco switches and routers. An adjacent attacker gaining code execution on core network devices could pivot to compromise entire network segments, intercept sensitive data, or disrupt critical services. Saudi critical infrastructure environments where physical network access may be shared (data centers, campus networks) are particularly at risk.
🏢 Affected Saudi Sectors
Telecommunications Government Banking Energy Healthcare Education Defense Transportation
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all Cisco IOS, IOS XE, and IOS XR devices in your environment using asset inventory tools
2. Apply Cisco security patches immediately — refer to Cisco Security Advisory cisco-sa-20180328-lldp
3. If patching is not immediately possible, disable LLDP on all interfaces where it is not required: 'no lldp run' globally or 'no lldp receive' / 'no lldp transmit' per interface
4. Implement Layer 2 network segmentation to limit adjacent attacker reach
5. Restrict physical and logical access to network segments containing vulnerable devices

Detection Rules:
- Monitor for abnormal or malformed LLDP packets on network segments using IDS/IPS signatures
- Deploy Snort/Suricata rules for LLDP buffer overflow attempts
- Monitor Cisco device logs for unexpected crashes or reloads (indicative of exploitation attempts)
- Enable LLDP packet rate limiting where supported

Long-term:
- Establish a regular Cisco IOS patching cycle
- Implement network access control (802.1X) to prevent unauthorized devices from reaching Layer 2 segments
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة Cisco IOS و IOS XE و IOS XR في بيئتكم باستخدام أدوات جرد الأصول
2. تطبيق تصحيحات سيسكو الأمنية فوراً — الرجوع إلى نشرة سيسكو الأمنية cisco-sa-20180328-lldp
3. في حال عدم إمكانية التحديث فوراً، تعطيل LLDP على جميع المنافذ غير المطلوبة: 'no lldp run' على مستوى الجهاز أو 'no lldp receive' / 'no lldp transmit' لكل منفذ
4. تطبيق تجزئة شبكة الطبقة الثانية للحد من نطاق وصول المهاجم المجاور
5. تقييد الوصول المادي والمنطقي لشرائح الشبكة التي تحتوي على أجهزة معرضة

قواعد الكشف:
- مراقبة حزم LLDP غير الطبيعية أو المشوهة على شرائح الشبكة باستخدام أنظمة كشف/منع التسلل
- نشر قواعد Snort/Suricata لمحاولات تجاوز المخزن المؤقت في LLDP
- مراقبة سجلات أجهزة سيسكو للأعطال أو إعادة التشغيل غير المتوقعة
- تفعيل تحديد معدل حزم LLDP حيثما أمكن

على المدى الطويل:
- إنشاء دورة تحديث منتظمة لأنظمة Cisco IOS
- تطبيق التحكم في الوصول للشبكة (802.1X) لمنع الأجهزة غير المصرح بها من الوصول لشرائح الطبقة الثانية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2-3-1 (Network Security) ECC 2-5-1 (Vulnerability Management) ECC 2-3-4 (Infrastructure Security) ECC 2-2-1 (Asset Management)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.4 (Vulnerability Management) 3.3.7 (Infrastructure Security) 3.1.1 (Asset Management)
🟡 ISO 27001:2022
A.8.9 (Configuration Management) A.8.8 (Management of Technical Vulnerabilities) A.8.20 (Network Security) A.8.22 (Segregation of Networks)
🟣 PCI DSS v4.0
PCI DSS 6.3.3 (Patching Security Vulnerabilities) PCI DSS 11.3 (Penetration Testing) PCI DSS 1.2 (Network Security Controls)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:IOS, XR, and XE Software
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS1.15%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-17
Published 2022-03-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.