CVE-2016-6391 (GCVE-0-2016-6391)
Vulnerability from cvelistv5
Published
2016-10-05 20:00
Modified
2024-08-06 01:29
Severity ?
CWE
  • n/a
Summary
Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:29:19.537Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1036914",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036914"
          },
          {
            "name": "93197",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93197"
          },
          {
            "name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-09-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-29T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1036914",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036914"
        },
        {
          "name": "93197",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93197"
        },
        {
          "name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2016-6391",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1036914",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036914"
            },
            {
              "name": "93197",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93197"
            },
            {
              "name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2016-6391",
    "datePublished": "2016-10-05T20:00:00",
    "dateReserved": "2016-07-26T00:00:00",
    "dateUpdated": "2024-08-06T01:29:19.537Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-6391\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2016-10-05T20:59:06.650\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS 12.2 y 15.0 hasta la versi\u00f3n 15.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (interrupci\u00f3n del procesamiento de tr\u00e1fico) a trav\u00e9s de una serie de peticiones Common Industrial Protocol (CIP) manipuladas, vulnerabilidad tambi\u00e9n conocida como ID CSCur69036.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E632468F-4B62-4937-8CA6-5B8023451F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C853E612-2C4B-4595-AD6F-22E34B68C69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E61C16-55F9-4054-8CC2-38D5197A1FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892F72BE-B65F-4271-9042-3B459DFBB43C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B526DE1-EEA7-47E4-B291-09C02F018A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700DDE2E-922C-426F-8751-BADD15055AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4A0517-EF86-4655-B4B4-246ED3A84803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E3912E-11F7-421B-A5C4-35568A6E386B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360F3E49-D75A-4ACE-B775-14055272C861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5362C676-5002-4ABC-9C60-97D4B65A399D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FCA457-9074-4876-A21A-144F03CD6450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054583DC-AAF8-4BF0-AC13-5A488476C161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A9B13E-8CF7-4879-8C33-8E690291335F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A634C47-2FD6-4106-86B6-DD465A5394E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05DDA3F8-7207-4FC9-B491-F49418975D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09AEBD6-56E7-4D22-B300-C904464FE75F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F414ABC6-B95C-48ED-BC15-817356248776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D601E90-6F2A-4C66-97A2-152031C88DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C57A83D0-E043-4294-A61D-730FAE30CCEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71493AA2-49E9-4FF5-AC29-DC2426973EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C1E9625-A8CF-4D0F-BB0D-9FB91391D977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DAE7DA-E0D3-4434-AD75-C8894D939A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F96295-2E72-4C23-B973-791B4A2B63F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8555124-BAFA-45D4-8208-ED1172D55F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B9D9B5-807F-494B-9ED2-7F4BDB32432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089D71A-8D46-4819-80E9-8A29BCA47EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A145F8D-30D1-44B5-A95F-C996961F4B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C172E7A8-7AB9-4269-ADA7-494CC4F08C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jab:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E4321-D52D-4C16-8821-ED16529C9090\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC643B-AA58-42EA-A777-52FCF6065F9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFB57C3-6CDF-46D1-858D-D5234956653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330125E6-3645-40B5-8E64-009B622090B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D874DF-54A1-47C7-B3D9-A9CE41A42418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEF825D-E2DA-43E3-8193-301CE202506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1485E3A5-A586-408A-8325-7572779DD0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2244E538-6B35-44E0-B93E-60B773745A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DB6B2A-19D2-4684-B07F-5D42EC850A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC1C381-4795-4992-BE3C-9615E005DE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80188F84-30DE-46AC-8E0C-984126B77CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECBF0A9-D84F-40A2-AC61-A9C59C819787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F129CF-FB92-49E9-BD86-90DDB8218FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C288D58-F765-4403-BF18-CC0A62B1AA60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C910D02-A7FD-4338-8DF3-18682F1B4C36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D6C6EE-CFD9-49A9-8784-498560847737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEE60A6-9E75-4B20-A06D-411E774511B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1451BB33-6BE0-4F4A-A193-14E13DECEE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3CD43-F30A-484B-9285-D925C1262212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F807A36A-9363-40F1-9B20-E5C4D503EB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200C1CD-DEAB-44FD-970D-098F3E01F36B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E71841-512D-483C-A911-86EA745AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17F3285-80E8-4BE5-8704-3379CF326601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9669DF61-DDC5-498D-906A-494D56BAE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45D0EFD-784A-4CDB-8FDB-41F6869B4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942CC01D-ED6E-4731-A61B-75CDF219F760\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93197\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1036914\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…