Lucene search

K
ciscoCiscoCISCO-SA-20160928-IPDR
HistorySep 28, 2016 - 4:00 p.m.

Cisco IOS and IOS XE Software IP Detail Record Denial of Service Vulnerability

2016-09-2816:00:00
tools.cisco.com
22

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

77.8%

A vulnerability in the IP Detail Record (IPDR) code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected system to reload.

The vulnerability is due to improper handling of IPDR packets. An attacker could exploit this vulnerability by sending crafted IPDR packets to an affected system. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr”]

This advisory is part of the September 28, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 11 vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of the advisories and links to them, see Cisco Event Response: September 2016 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication[“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-56513”].

Affected configurations

Vulners
Node
ciscoiosMatch12.2cx
OR
ciscoiosMatch12.2cy
OR
ciscoiosMatch12.2sch
OR
ciscoiosMatch12.2sci
OR
ciscoiosMatch15.6sp
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.12sxe
OR
ciscocisco_iosMatch3.14sxe
OR
ciscocisco_iosMatch3.15sxe
OR
ciscocisco_iosMatch3.16sxe
OR
ciscocisco_iosMatch16.1xe
OR
ciscoiosMatch12.2\(33\)cx
OR
ciscoiosMatch12.2\(33\)cy
OR
ciscoiosMatch12.2\(33\)cy1
OR
ciscoiosMatch12.2\(33\)sch
OR
ciscoiosMatch12.2\(33\)sch1
OR
ciscoiosMatch12.2\(33\)sch2
OR
ciscoiosMatch12.2\(33\)sch0a
OR
ciscoiosMatch12.2\(33\)sch3
OR
ciscoiosMatch12.2\(33\)sch2a
OR
ciscoiosMatch12.2\(33\)sch4
OR
ciscoiosMatch12.2\(33\)sch5
OR
ciscoiosMatch12.2\(33\)sch6
OR
ciscoiosMatch12.2\(33\)sci
OR
ciscoiosMatch12.2\(33\)sci1
OR
ciscoiosMatch12.2\(33\)sci1a
OR
ciscoiosMatch15.6\(2\)sp3
OR
ciscocisco_iosMatch3.10.4sxe
OR
ciscocisco_iosMatch3.12.0asxe
OR
ciscocisco_iosMatch3.14.0sxe
OR
ciscocisco_iosMatch3.14.1sxe
OR
ciscocisco_iosMatch3.14.2sxe
OR
ciscocisco_iosMatch3.14.3sxe
OR
ciscocisco_iosMatch3.14.4sxe
OR
ciscocisco_iosMatch3.15.0sxe
OR
ciscocisco_iosMatch3.15.1sxe
OR
ciscocisco_iosMatch3.15.2sxe
OR
ciscocisco_iosMatch3.15.1csxe
OR
ciscocisco_iosMatch3.15.3sxe
OR
ciscocisco_iosMatch3.15.4sxe
OR
ciscocisco_iosMatch3.16.0sxe
OR
ciscocisco_iosMatch3.16.0asxe
OR
ciscocisco_iosMatch3.16.0bsxe
OR
ciscocisco_iosMatch3.16.0csxe
OR
ciscocisco_iosMatch16.1.1xe
OR
ciscocisco_iosMatch16.1.2xe
OR
ciscocisco_iosMatch16.1.3xe
VendorProductVersionCPE
ciscoios12.2cxcpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*
ciscoios12.2cycpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*
ciscoios12.2schcpe:2.3:o:cisco:ios:12.2sch:*:*:*:*:*:*:*
ciscoios12.2scicpe:2.3:o:cisco:ios:12.2sci:*:*:*:*:*:*:*
ciscoios15.6spcpe:2.3:o:cisco:ios:15.6sp:*:*:*:*:*:*:*
ciscocisco_ios3.10scpe:2.3:o:cisco:cisco_ios:3.10s:xe:*:*:*:*:*:*
ciscocisco_ios3.12scpe:2.3:o:cisco:cisco_ios:3.12s:xe:*:*:*:*:*:*
ciscocisco_ios3.14scpe:2.3:o:cisco:cisco_ios:3.14s:xe:*:*:*:*:*:*
ciscocisco_ios3.15scpe:2.3:o:cisco:cisco_ios:3.15s:xe:*:*:*:*:*:*
ciscocisco_ios3.16scpe:2.3:o:cisco:cisco_ios:3.16s:xe:*:*:*:*:*:*
Rows per page:
1-10 of 471

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

77.8%

Related for CISCO-SA-20160928-IPDR