var-201603-0296
Vulnerability from variot
The Wide Area Application Services (WAAS) Express implementation in Cisco IOS 15.1 through 15.5 allows remote attackers to cause a denial of service (device reload) via a crafted TCP segment, aka Bug ID CSCuq59708. Cisco IOS is an operating system developed by Cisco Systems for its network devices. CiscoWideAreaApplicationServicesExpress is a product of CiscoWAAS based on IOS and integrated into the router to provide application acceleration and reduce WAN bandwidth costs. Cisco IOS Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to reload the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuq59708
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0296", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)jaz1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(1\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb5a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)m7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)gc2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb8a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(1\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.4\\(3\\)m3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)m6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(2\\)t1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.5\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jaa1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(4\\)xb8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)m" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "15.1 to 15.5" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.1-15.5" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.3\\\\\\(2\\\\\\)t4" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.3\\\\\\(1\\\\\\)t4" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.3\\\\\\(3\\\\\\)m2" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.1\\\\\\(2\\\\\\)gc2" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.1\\\\\\(4\\\\\\)m9" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.3\\\\\\(3\\\\\\)m1" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.4\\\\\\(2\\\\\\)t" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.2\\\\\\(2\\\\\\)jn1" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.2\\\\\\(2\\\\\\)jb3" }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.2\\\\\\(4\\\\\\)ja1" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "BID", "id": "85306" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNNVD", "id": "CNNVD-201603-360" }, { "db": "NVD", "id": "CVE-2016-1347" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001905" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "85306" } ], "trust": 0.3 }, "cve": "CVE-2016-1347", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-1347", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-01886", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-90166", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-1347", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1347", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-1347", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-01886", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201603-360", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-90166", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "VULHUB", "id": "VHN-90166" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNNVD", "id": "CNNVD-201603-360" }, { "db": "NVD", "id": "CVE-2016-1347" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wide Area Application Services (WAAS) Express implementation in Cisco IOS 15.1 through 15.5 allows remote attackers to cause a denial of service (device reload) via a crafted TCP segment, aka Bug ID CSCuq59708. Cisco IOS is an operating system developed by Cisco Systems for its network devices. CiscoWideAreaApplicationServicesExpress is a product of CiscoWAAS based on IOS and integrated into the router to provide application acceleration and reduce WAN bandwidth costs. Cisco IOS Software is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to reload the affected device, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCuq59708", "sources": [ { "db": "NVD", "id": "CVE-2016-1347" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "BID", "id": "85306" }, { "db": "VULHUB", "id": "VHN-90166" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1347", "trust": 3.4 }, { "db": "SECTRACK", "id": "1035380", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2016-001905", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201603-360", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-01886", "trust": 0.6 }, { "db": "BID", "id": "85306", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-90166", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "VULHUB", "id": "VHN-90166" }, { "db": "BID", "id": "85306" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNNVD", "id": "CNNVD-201603-360" }, { "db": "NVD", "id": "CVE-2016-1347" } ] }, "id": "VAR-201603-0296", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "VULHUB", "id": "VHN-90166" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" } ] }, "last_update_date": "2024-11-23T23:05:36.444000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160323-l4f", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f" }, { "title": "cisco-sa-20160323-l4f", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/113/1136/1136609_cisco-sa-20160323-l4f-j.html" }, { "title": "Cisco IOS SoftwareWideAreaApplicationServicesExpress denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/73322" }, { "title": "Cisco IOS Software Wide Area Application Services Express Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60685" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNNVD", "id": "CNNVD-201603-360" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90166" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "NVD", "id": "CVE-2016-1347" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160323-l4f" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1035380" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1347" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1347" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/routers/wide-area-application-services/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "VULHUB", "id": "VHN-90166" }, { "db": "BID", "id": "85306" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNNVD", "id": "CNNVD-201603-360" }, { "db": "NVD", "id": "CVE-2016-1347" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "VULHUB", "id": "VHN-90166" }, { "db": "BID", "id": "85306" }, { "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "db": "CNNVD", "id": "CNNVD-201603-360" }, { "db": "NVD", "id": "CVE-2016-1347" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-28T00:00:00", "db": "CNVD", "id": "CNVD-2016-01886" }, { "date": "2016-03-24T00:00:00", "db": "VULHUB", "id": "VHN-90166" }, { "date": "2016-03-23T00:00:00", "db": "BID", "id": "85306" }, { "date": "2016-03-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "date": "2016-03-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-360" }, { "date": "2016-03-24T22:59:00.077000", "db": "NVD", "id": "CVE-2016-1347" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-03-28T00:00:00", "db": "CNVD", "id": "CNVD-2016-01886" }, { "date": "2016-12-03T00:00:00", "db": "VULHUB", "id": "VHN-90166" }, { "date": "2016-03-23T00:00:00", "db": "BID", "id": "85306" }, { "date": "2016-03-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001905" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201603-360" }, { "date": "2024-11-21T02:46:13.770000", "db": "NVD", "id": "CVE-2016-1347" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-360" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS Software Wide Area Application Services Express Denial of Service Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-01886" }, { "db": "CNNVD", "id": "CNNVD-201603-360" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201603-360" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…