var-201701-0855
Vulnerability from variot
An IKE Packet Parsing Denial of Service Vulnerability in the ipsecmgr process of Cisco ASR 5000 Software could allow an unauthenticated, remote attacker to cause the ipsecmgr process to reload. More Information: CSCuy06917 CSCuy45036 CSCuy59525. Known Affected Releases: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Known Fixed Releases: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135. Vendors have confirmed this vulnerability Bug ID CSCuy06917 , CSCuy45036 , CSCuy59525 It is released as.By an authenticated remote attacker, ipsecmgr The process may be reloaded. Cisco ASR5000 Series Software is a 5000 series wireless controller product from Cisco. An attacker can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuy06917, CSCuy45036 and CSCuy59525
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201701-0855", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.1.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.1.a0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.1.v0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.m0.62842" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.m0.63229" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "20.0.v0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "21.0.0" }, { "model": "asr series software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "asr series software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "BID", "id": "95629" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNNVD", "id": "CNNVD-201701-792" }, { "db": "NVD", "id": "CVE-2016-9216" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:asr_5000_series_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007065" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "95629" }, { "db": "CNNVD", "id": "CNNVD-201701-792" } ], "trust": 0.9 }, "cve": "CVE-2016-9216", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-9216", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-00903", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-98036", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-9216", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9216", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-9216", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-00903", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201701-792", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-98036", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "VULHUB", "id": "VHN-98036" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNNVD", "id": "CNNVD-201701-792" }, { "db": "NVD", "id": "CVE-2016-9216" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An IKE Packet Parsing Denial of Service Vulnerability in the ipsecmgr process of Cisco ASR 5000 Software could allow an unauthenticated, remote attacker to cause the ipsecmgr process to reload. More Information: CSCuy06917 CSCuy45036 CSCuy59525. Known Affected Releases: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Known Fixed Releases: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135. Vendors have confirmed this vulnerability Bug ID CSCuy06917 , CSCuy45036 , CSCuy59525 It is released as.By an authenticated remote attacker, ipsecmgr The process may be reloaded. Cisco ASR5000 Series Software is a 5000 series wireless controller product from Cisco. \nAn attacker can exploit this issue to cause denial-of-service conditions. \nThis issue is being tracked by Cisco Bug ID CSCuy06917, CSCuy45036 and CSCuy59525", "sources": [ { "db": "NVD", "id": "CVE-2016-9216" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "BID", "id": "95629" }, { "db": "VULHUB", "id": "VHN-98036" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9216", "trust": 3.4 }, { "db": "BID", "id": "95629", "trust": 2.6 }, { "db": "SECTRACK", "id": "1037652", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-007065", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201701-792", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-00903", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-98036", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "VULHUB", "id": "VHN-98036" }, { "db": "BID", "id": "95629" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNNVD", "id": "CNNVD-201701-792" }, { "db": "NVD", "id": "CVE-2016-9216" } ] }, "id": "VAR-201701-0855", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "VULHUB", "id": "VHN-98036" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" } ] }, "last_update_date": "2024-11-23T22:45:47.162000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170118-asr", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-asr" }, { "title": "Patch for CiscoASR5000SeriesSoftware Denial of Service Vulnerability (CNVD-2017-00903)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/88575" }, { "title": "Cisco ASR 5000 Series Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67350" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNNVD", "id": "CNNVD-201701-792" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98036" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "NVD", "id": "CVE-2016-9216" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/95629" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170118-asr" }, { "trust": 1.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9216" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037652" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9216" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "VULHUB", "id": "VHN-98036" }, { "db": "BID", "id": "95629" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNNVD", "id": "CNNVD-201701-792" }, { "db": "NVD", "id": "CVE-2016-9216" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-00903" }, { "db": "VULHUB", "id": "VHN-98036" }, { "db": "BID", "id": "95629" }, { "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "db": "CNNVD", "id": "CNNVD-201701-792" }, { "db": "NVD", "id": "CVE-2016-9216" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-00903" }, { "date": "2017-01-26T00:00:00", "db": "VULHUB", "id": "VHN-98036" }, { "date": "2017-01-18T00:00:00", "db": "BID", "id": "95629" }, { "date": "2017-02-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "date": "2017-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-792" }, { "date": "2017-01-26T07:59:00.137000", "db": "NVD", "id": "CVE-2016-9216" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-05T00:00:00", "db": "CNVD", "id": "CNVD-2017-00903" }, { "date": "2017-02-11T00:00:00", "db": "VULHUB", "id": "VHN-98036" }, { "date": "2017-01-23T02:11:00", "db": "BID", "id": "95629" }, { "date": "2017-02-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007065" }, { "date": "2017-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-792" }, { "date": "2024-11-21T03:00:48.900000", "db": "NVD", "id": "CVE-2016-9216" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-792" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASR 5000 Software ipsecmgr Service disruption in the process (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007065" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-792" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.