Lucene search

K
ciscoCiscoCISCO-SA-20160323-L4F
HistoryMar 23, 2016 - 4:00 p.m.

Cisco IOS Software Wide Area Application Services Express Denial of Service Vulnerability

2016-03-2316:00:00
tools.cisco.com
14

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

61.4%

A vulnerability in the Wide Area Application Services (WAAS) Express feature of Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload.

The vulnerability is due to insufficient validation of TCP segments. An attacker could exploit this vulnerability by routing a crafted TCP segment through an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a denial of service (DoS) condition.

To exploit this vulnerability, the attacker needs to route a crafted TCP segment through an egress interface of a device because the vulnerable function is an output feature of the software. In addition, the WAAS Express feature must be enabled on the interface, typically a WAN interface. In most deployments, this means crafted traffic must be initiated from within a device to exploit the vulnerability.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f”]

This advisory is part of the March 23, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes six Cisco Security Advisories that describe six vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of advisories and links to them, see Cisco Event Response: Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication[“http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html”].

Affected configurations

Vulners
Node
ciscoiosMatch15.1xb
OR
ciscoiosMatch15.3t
OR
ciscoiosMatch15.1m
OR
ciscoiosMatch15.1gc
OR
ciscoiosMatch15.2m
OR
ciscoiosMatch15.4t
OR
ciscoiosMatch15.3m
OR
ciscoiosMatch15.4m
OR
ciscoiosMatch15.2jaz
OR
ciscoiosMatch15.5t
OR
ciscoiosMatch15.5m
OR
ciscoiosMatch15.3jaa
OR
ciscoiosMatch15.1\(4\)xb4
OR
ciscoiosMatch15.1\(4\)xb5
OR
ciscoiosMatch15.1\(4\)xb6
OR
ciscoiosMatch15.1\(4\)xb5a
OR
ciscoiosMatch15.1\(4\)xb7
OR
ciscoiosMatch15.1\(4\)xb8
OR
ciscoiosMatch15.1\(4\)xb8a
OR
ciscoiosMatch15.3\(1\)t2
OR
ciscoiosMatch15.1\(4\)m6
OR
ciscoiosMatch15.1\(4\)gc2
OR
ciscoiosMatch15.2\(4\)m7
OR
ciscoiosMatch15.4\(1\)t
OR
ciscoiosMatch15.4\(2\)t
OR
ciscoiosMatch15.4\(1\)t2
OR
ciscoiosMatch15.4\(1\)t1
OR
ciscoiosMatch15.4\(2\)t1
OR
ciscoiosMatch15.4\(2\)t3
OR
ciscoiosMatch15.4\(2\)t2
OR
ciscoiosMatch15.4\(2\)t4
OR
ciscoiosMatch15.3\(3\)m3
OR
ciscoiosMatch15.3\(3\)m4
OR
ciscoiosMatch15.3\(3\)m6
OR
ciscoiosMatch15.4\(3\)m
OR
ciscoiosMatch15.4\(3\)m1
OR
ciscoiosMatch15.4\(3\)m2
OR
ciscoiosMatch15.4\(3\)m3
OR
ciscoiosMatch15.2\(4\)jaz1
OR
ciscoiosMatch15.5\(2\)t1
OR
ciscoiosMatch15.5\(2\)t2
OR
ciscoiosMatch15.5\(2\)t3
OR
ciscoiosMatch15.5\(3\)m
OR
ciscoiosMatch15.3\(3\)jaa1
VendorProductVersionCPE
ciscoios15.1xbcpe:2.3:o:cisco:ios:15.1xb:*:*:*:*:*:*:*
ciscoios15.3tcpe:2.3:o:cisco:ios:15.3t:*:*:*:*:*:*:*
ciscoios15.1mcpe:2.3:o:cisco:ios:15.1m:*:*:*:*:*:*:*
ciscoios15.1gccpe:2.3:o:cisco:ios:15.1gc:*:*:*:*:*:*:*
ciscoios15.2mcpe:2.3:o:cisco:ios:15.2m:*:*:*:*:*:*:*
ciscoios15.4tcpe:2.3:o:cisco:ios:15.4t:*:*:*:*:*:*:*
ciscoios15.3mcpe:2.3:o:cisco:ios:15.3m:*:*:*:*:*:*:*
ciscoios15.4mcpe:2.3:o:cisco:ios:15.4m:*:*:*:*:*:*:*
ciscoios15.2jazcpe:2.3:o:cisco:ios:15.2jaz:*:*:*:*:*:*:*
ciscoios15.5tcpe:2.3:o:cisco:ios:15.5t:*:*:*:*:*:*:*
Rows per page:
1-10 of 441

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

61.4%

Related for CISCO-SA-20160323-L4F