INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h Global data_breach Government CRITICAL 3h Global ransomware Financial Services / Cybersecurity CRITICAL 3h Global vulnerability Information Technology / Cybersecurity CRITICAL 5h Global malware Energy and Utilities CRITICAL 6h Global ransomware Multiple sectors CRITICAL 6h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 9h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 9h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 10h Global ransomware Multiple sectors (U.S. companies) CRITICAL 10h
Vulnerabilities

CVE-2018-0179

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco IOS Software Denial-of-Service Vulnerability — A vulnerability in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco IOS Software Denial-of-Service Vulnerability — A vulnerability in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition.

🤖 AI Executive Summary

CVE-2018-0179 is a critical vulnerability in the Cisco IOS Software Login Enhancements (Login Block) feature that allows an unauthenticated, remote attacker to trigger a device reload, causing a denial of service condition. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses a significant risk to network infrastructure. Organizations relying on Cisco IOS-based routers and switches are at immediate risk of network disruption. A patch is available from Cisco and should be applied urgently.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 9, 2026 17:17
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability has significant impact across Saudi Arabian critical infrastructure given the widespread deployment of Cisco IOS devices. The telecommunications sector (STC, Mobily, Zain) is at highest risk as core and edge routers may be affected. Government networks regulated by NCA, banking institutions under SAMA oversight, Saudi Aramco and energy sector SCADA/OT network infrastructure, and healthcare networks all commonly use Cisco IOS devices. A successful exploit could cause cascading network outages affecting essential services. Given that Saudi Arabia's Vision 2030 digital transformation relies heavily on network availability, this vulnerability poses a direct threat to national digital infrastructure resilience.
🏢 Affected Saudi Sectors
Telecommunications Government Banking Energy Healthcare Education Defense
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
1. IMMEDIATE ACTIONS:
- Identify all Cisco IOS devices with Login Enhancements (Login Block) feature enabled using 'show running-config | include login block-for'
- If the feature is not required, disable it immediately as a compensating control: 'no login block-for'
- Implement access control lists (ACLs) to restrict management access to trusted IP addresses only

2. PATCHING GUIDANCE:
- Apply the Cisco IOS Software update referenced in Cisco Security Advisory cisco-sa-20180328-slogin
- Schedule emergency maintenance windows for internet-facing and critical infrastructure devices
- Test patches in a lab environment before production deployment

3. COMPENSATING CONTROLS:
- Deploy out-of-band management networks to limit attack surface
- Enable Control Plane Policing (CoPP) to rate-limit management traffic
- Use VTY line ACLs to restrict SSH/Telnet access
- Implement infrastructure ACLs (iACLs) at network borders

4. DETECTION RULES:
- Monitor for unexpected device reloads via syslog (RELOAD messages)
- Alert on excessive failed login attempts targeting Cisco devices
- Implement SNMP traps for device availability monitoring
- Deploy IDS/IPS signatures for CVE-2018-0179 exploit patterns
🔧 خطوات المعالجة (العربية)
1. الإجراءات الفورية:
- تحديد جميع أجهزة Cisco IOS التي تم تفعيل ميزة تحسينات تسجيل الدخول عليها باستخدام الأمر 'show running-config | include login block-for'
- إذا لم تكن الميزة مطلوبة، قم بتعطيلها فوراً كإجراء تعويضي: 'no login block-for'
- تطبيق قوائم التحكم بالوصول (ACLs) لتقييد الوصول الإداري للعناوين الموثوقة فقط

2. إرشادات التصحيح:
- تطبيق تحديث Cisco IOS المشار إليه في تنبيه Cisco الأمني cisco-sa-20180328-slogin
- جدولة نوافذ صيانة طارئة للأجهزة المواجهة للإنترنت والبنية التحتية الحرجة
- اختبار التصحيحات في بيئة معملية قبل النشر في بيئة الإنتاج

3. الضوابط التعويضية:
- نشر شبكات إدارة خارج النطاق لتقليل سطح الهجوم
- تفعيل سياسات حماية مستوى التحكم (CoPP) للحد من حركة الإدارة
- استخدام قوائم ACL لخطوط VTY لتقييد وصول SSH/Telnet
- تطبيق قوائم ACL للبنية التحتية على حدود الشبكة

4. قواعد الكشف:
- مراقبة إعادة التشغيل غير المتوقعة للأجهزة عبر سجلات النظام
- التنبيه عند محاولات تسجيل الدخول الفاشلة المفرطة
- تطبيق تنبيهات SNMP لمراقبة توفر الأجهزة
- نشر توقيعات IDS/IPS لأنماط استغلال CVE-2018-0179
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Network Security) ECC-2:3-4 (Patch Management) ECC-2:5-2 (Vulnerability Management) ECC-2:4-1 (Incident Management)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.4 (Patch Management) 3.3.7 (Vulnerability Management) 3.4.1 (Incident Response)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.20 (Networks security) A.8.9 (Configuration management) A.5.24 (Information security incident management planning)
🟣 PCI DSS v4.0
PCI DSS 6.3.3 (Patching security vulnerabilities) PCI DSS 1.2.1 (Network security controls) PCI DSS 11.3 (Vulnerability scanning)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:IOS Software
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS1.50%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-17
Published 2022-03-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.