Lucene search

K
cveCiscoCVE-2016-1351
HistoryMar 26, 2016 - 1:59 a.m.

CVE-2016-1351

2016-03-2601:59:05
CWE-20
CWE-399
cisco
web.nvd.nist.gov
29
4
cisco
lisp
implementation
vulnerability
denial of service
cisco ios
nx-os
nvd
cve-2016-1351

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

High

EPSS

0.003

Percentile

65.1%

The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.1 and 15.2 and NX-OS 4.1 through 6.2 allows remote attackers to cause a denial of service (device reload) via a crafted header in a packet, aka Bug ID CSCuu64279.

Affected configurations

Nvd
Node
ciscoiosMatch15.1\(1\)sy1
OR
ciscoiosMatch15.1\(1\)sy2
OR
ciscoiosMatch15.1\(1\)sy3
OR
ciscoiosMatch15.1\(1\)sy4
OR
ciscoiosMatch15.1\(1\)sy5
OR
ciscoiosMatch15.1\(2\)sy
OR
ciscoiosMatch15.1\(2\)sy1
OR
ciscoiosMatch15.1\(2\)sy2
OR
ciscoiosMatch15.1\(2\)sy3
OR
ciscoiosMatch15.1\(2\)sy4
OR
ciscoiosMatch15.1\(2\)sy4a
OR
ciscoiosMatch15.1\(2\)sy5
OR
ciscoiosMatch15.1\(2\)sy6
OR
ciscoiosMatch15.2\(1\)sy
OR
ciscoiosMatch15.2\(1\)sy0a
OR
ciscoiosMatch15.2\(1\)sy1
OR
ciscoiosMatch15.3\(3\)jk6
OR
cisconx-osMatch4.1\(2\)
OR
cisconx-osMatch4.1\(3\)
OR
cisconx-osMatch4.1\(4\)
OR
cisconx-osMatch4.1\(5\)
OR
cisconx-osMatch4.2\(2a\)
OR
cisconx-osMatch4.2\(3\)
OR
cisconx-osMatch4.2\(4\)
OR
cisconx-osMatch4.2\(6\)
OR
cisconx-osMatch4.2\(8\)
OR
cisconx-osMatch5.0\(2a\)
OR
cisconx-osMatch5.0\(3\)
OR
cisconx-osMatch5.0\(5\)
OR
cisconx-osMatch5.1\(1\)
OR
cisconx-osMatch5.1\(1a\)
OR
cisconx-osMatch5.1\(3\)
OR
cisconx-osMatch5.1\(4\)
OR
cisconx-osMatch5.1\(5\)
OR
cisconx-osMatch5.1\(6\)
OR
cisconx-osMatch5.2\(1\)
OR
cisconx-osMatch5.2\(3a\)
OR
cisconx-osMatch5.2\(4\)
OR
cisconx-osMatch5.2\(5\)
OR
cisconx-osMatch5.2\(7\)
OR
cisconx-osMatch5.2\(9\)
OR
cisconx-osMatch6.0\(1\)
OR
cisconx-osMatch6.0\(2\)
OR
cisconx-osMatch6.0\(3\)
OR
cisconx-osMatch6.0\(4\)
OR
cisconx-osMatch6.1\(1\)
OR
cisconx-osMatch6.1\(2\)
OR
cisconx-osMatch6.1\(3\)
OR
cisconx-osMatch6.1\(4\)
OR
cisconx-osMatch6.1\(4a\)
OR
cisconx-osMatch6.2\(2\)
OR
cisconx-osMatch6.2\(2a\)
OR
cisconx-osMatch6.2\(6\)
OR
cisconx-osMatch6.2\(6b\)
OR
cisconx-osMatch6.2\(8\)
OR
cisconx-osMatch6.2\(8a\)
OR
cisconx-osMatch6.2\(8b\)
OR
cisconx-osMatch6.2\(10\)
OR
cisconx-osMatch6.2\(12\)
VendorProductVersionCPE
ciscoios15.1(1)sy1cpe:2.3:o:cisco:ios:15.1\(1\)sy1:*:*:*:*:*:*:*
ciscoios15.1(1)sy2cpe:2.3:o:cisco:ios:15.1\(1\)sy2:*:*:*:*:*:*:*
ciscoios15.1(1)sy3cpe:2.3:o:cisco:ios:15.1\(1\)sy3:*:*:*:*:*:*:*
ciscoios15.1(1)sy4cpe:2.3:o:cisco:ios:15.1\(1\)sy4:*:*:*:*:*:*:*
ciscoios15.1(1)sy5cpe:2.3:o:cisco:ios:15.1\(1\)sy5:*:*:*:*:*:*:*
ciscoios15.1(2)sycpe:2.3:o:cisco:ios:15.1\(2\)sy:*:*:*:*:*:*:*
ciscoios15.1(2)sy1cpe:2.3:o:cisco:ios:15.1\(2\)sy1:*:*:*:*:*:*:*
ciscoios15.1(2)sy2cpe:2.3:o:cisco:ios:15.1\(2\)sy2:*:*:*:*:*:*:*
ciscoios15.1(2)sy3cpe:2.3:o:cisco:ios:15.1\(2\)sy3:*:*:*:*:*:*:*
ciscoios15.1(2)sy4cpe:2.3:o:cisco:ios:15.1\(2\)sy4:*:*:*:*:*:*:*
Rows per page:
1-10 of 591

Social References

More

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

High

EPSS

0.003

Percentile

65.1%