Lucene search

K
cveCiscoCVE-2016-6379
HistoryOct 05, 2016 - 8:59 p.m.

CVE-2016-6379

2016-10-0520:59:02
CWE-20
cisco
web.nvd.nist.gov
32
cve-2016-6379
cisco
ios
denial of service
vulnerability

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0.006

Percentile

77.8%

Cisco IOS 12.2 and IOS XE 3.14 through 3.16 and 16.1 allow remote attackers to cause a denial of service (device reload) via crafted IP Detail Record (IPDR) packets, aka Bug ID CSCuu35089.

Affected configurations

Nvd
Node
ciscoiosMatch12.2\(33\)cx
OR
ciscoiosMatch12.2\(33\)cy
OR
ciscoiosMatch12.2\(33\)cy1
OR
ciscoiosMatch12.2\(33\)sch
OR
ciscoiosMatch12.2\(33\)sch0a
OR
ciscoiosMatch12.2\(33\)sch1
OR
ciscoiosMatch12.2\(33\)sch2
OR
ciscoiosMatch12.2\(33\)sch2a
OR
ciscoiosMatch12.2\(33\)sch3
OR
ciscoiosMatch12.2\(33\)sch4
OR
ciscoiosMatch12.2\(33\)sch5
OR
ciscoiosMatch12.2\(33\)sch6
OR
ciscoiosMatch12.2\(33\)sci
OR
ciscoiosMatch12.2\(33\)sci1
OR
ciscoiosMatch12.2\(33\)sci1a
OR
ciscoiosMatch12.2\(33\)sci3
OR
ciscoios_xeMatch3.14.0s
OR
ciscoios_xeMatch3.14.1s
OR
ciscoios_xeMatch3.14.2s
OR
ciscoios_xeMatch3.14.3s
OR
ciscoios_xeMatch3.14.4s
OR
ciscoios_xeMatch3.15.0s
OR
ciscoios_xeMatch3.15.1cs
OR
ciscoios_xeMatch3.15.1s
OR
ciscoios_xeMatch3.15.2s
OR
ciscoios_xeMatch3.15.3s
OR
ciscoios_xeMatch3.15.4s
OR
ciscoios_xeMatch3.16.0cs
OR
ciscoios_xeMatch3.16.0s
OR
ciscoios_xeMatch16.1.1
OR
ciscoios_xeMatch16.1.2
OR
ciscoios_xeMatch16.1.3
VendorProductVersionCPE
ciscoios12.2(33)cxcpe:2.3:o:cisco:ios:12.2\(33\)cx:*:*:*:*:*:*:*
ciscoios12.2(33)cycpe:2.3:o:cisco:ios:12.2\(33\)cy:*:*:*:*:*:*:*
ciscoios12.2(33)cy1cpe:2.3:o:cisco:ios:12.2\(33\)cy1:*:*:*:*:*:*:*
ciscoios12.2(33)schcpe:2.3:o:cisco:ios:12.2\(33\)sch:*:*:*:*:*:*:*
ciscoios12.2(33)sch0acpe:2.3:o:cisco:ios:12.2\(33\)sch0a:*:*:*:*:*:*:*
ciscoios12.2(33)sch1cpe:2.3:o:cisco:ios:12.2\(33\)sch1:*:*:*:*:*:*:*
ciscoios12.2(33)sch2cpe:2.3:o:cisco:ios:12.2\(33\)sch2:*:*:*:*:*:*:*
ciscoios12.2(33)sch2acpe:2.3:o:cisco:ios:12.2\(33\)sch2a:*:*:*:*:*:*:*
ciscoios12.2(33)sch3cpe:2.3:o:cisco:ios:12.2\(33\)sch3:*:*:*:*:*:*:*
ciscoios12.2(33)sch4cpe:2.3:o:cisco:ios:12.2\(33\)sch4:*:*:*:*:*:*:*
Rows per page:
1-10 of 321

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0.006

Percentile

77.8%