CVE-2016-6391 (GCVE-0-2016-6391)
Vulnerability from cvelistv5 – Published: 2016-10-05 20:00 – Updated: 2024-08-06 01:29
VLAI?
Summary
Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:29:19.537Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1036914",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1036914"
},
{
"name": "93197",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/93197"
},
{
"name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-09-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-29T09:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1036914",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1036914"
},
{
"name": "93197",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/93197"
},
{
"name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6391",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1036914",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036914"
},
{
"name": "93197",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93197"
},
{
"name": "20160928 Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2016-6391",
"datePublished": "2016-10-05T20:00:00",
"dateReserved": "2016-07-26T00:00:00",
"dateUpdated": "2024-08-06T01:29:19.537Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E632468F-4B62-4937-8CA6-5B8023451F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C853E612-2C4B-4595-AD6F-22E34B68C69A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E61C16-55F9-4054-8CC2-38D5197A1FDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"892F72BE-B65F-4271-9042-3B459DFBB43C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B526DE1-EEA7-47E4-B291-09C02F018A16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"700DDE2E-922C-426F-8751-BADD15055AD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D4A0517-EF86-4655-B4B4-246ED3A84803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0E3912E-11F7-421B-A5C4-35568A6E386B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"360F3E49-D75A-4ACE-B775-14055272C861\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5362C676-5002-4ABC-9C60-97D4B65A399D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF55C0A-768F-445A-AF40-2B553363AF18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)eb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15FCA457-9074-4876-A21A-144F03CD6450\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"054583DC-AAF8-4BF0-AC13-5A488476C161\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A9B13E-8CF7-4879-8C33-8E690291335F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A634C47-2FD6-4106-86B6-DD465A5394E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05DDA3F8-7207-4FC9-B491-F49418975D5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D09AEBD6-56E7-4D22-B300-C904464FE75F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F414ABC6-B95C-48ED-BC15-817356248776\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D601E90-6F2A-4C66-97A2-152031C88DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3A156FE-590E-49DB-819D-4103D629829D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F6C767-042C-4277-90F4-F81D9AFFF227\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D33DB919-4F82-43C6-830A-A9D4FC043B42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F904CD0-8609-47F7-988C-613DE26BDBB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C57A83D0-E043-4294-A61D-730FAE30CCEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71493AA2-49E9-4FF5-AC29-DC2426973EC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C1E9625-A8CF-4D0F-BB0D-9FB91391D977\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1n:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49DAE7DA-E0D3-4434-AD75-C8894D939A83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85F96295-2E72-4C23-B973-791B4A2B63F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8555124-BAFA-45D4-8208-ED1172D55F53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04B9D9B5-807F-494B-9ED2-7F4BDB32432A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6089D71A-8D46-4819-80E9-8A29BCA47EDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A145F8D-30D1-44B5-A95F-C996961F4B33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja77:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C172E7A8-7AB9-4269-ADA7-494CC4F08C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jab:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E4321-D52D-4C16-8821-ED16529C9090\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AAC643B-AA58-42EA-A777-52FCF6065F9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CFB57C3-6CDF-46D1-858D-D5234956653D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"330125E6-3645-40B5-8E64-009B622090B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D874DF-54A1-47C7-B3D9-A9CE41A42418\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECEF825D-E2DA-43E3-8193-301CE202506C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1485E3A5-A586-408A-8325-7572779DD0E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2244E538-6B35-44E0-B93E-60B773745A99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9DB6B2A-19D2-4684-B07F-5D42EC850A8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDC1C381-4795-4992-BE3C-9615E005DE46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80188F84-30DE-46AC-8E0C-984126B77CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DECBF0A9-D84F-40A2-AC61-A9C59C819787\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9F129CF-FB92-49E9-BD86-90DDB8218FF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C288D58-F765-4403-BF18-CC0A62B1AA60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C910D02-A7FD-4338-8DF3-18682F1B4C36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5D6C6EE-CFD9-49A9-8784-498560847737\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFEE60A6-9E75-4B20-A06D-411E774511B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1451BB33-6BE0-4F4A-A193-14E13DECEE20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BC3CD43-F30A-484B-9285-D925C1262212\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F807A36A-9363-40F1-9B20-E5C4D503EB1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5200C1CD-DEAB-44FD-970D-098F3E01F36B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8E71841-512D-483C-A911-86EA745AC00E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F17F3285-80E8-4BE5-8704-3379CF326601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9669DF61-DDC5-498D-906A-494D56BAE450\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F45D0EFD-784A-4CDB-8FDB-41F6869B4735\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"942CC01D-ED6E-4731-A61B-75CDF219F760\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.\"}, {\"lang\": \"es\", \"value\": \"Cisco IOS 12.2 y 15.0 hasta la versi\\u00f3n 15.3 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (interrupci\\u00f3n del procesamiento de tr\\u00e1fico) a trav\\u00e9s de una serie de peticiones Common Industrial Protocol (CIP) manipuladas, vulnerabilidad tambi\\u00e9n conocida como ID CSCur69036.\"}]",
"id": "CVE-2016-6391",
"lastModified": "2024-11-21T02:56:02.303",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-10-05T20:59:06.650",
"references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/93197\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id/1036914\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/93197\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1036914\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-6391\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2016-10-05T20:59:06.650\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS 12.2 y 15.0 hasta la versi\u00f3n 15.3 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (interrupci\u00f3n del procesamiento de tr\u00e1fico) a trav\u00e9s de una serie de peticiones Common Industrial Protocol (CIP) manipuladas, vulnerabilidad tambi\u00e9n conocida como ID CSCur69036.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E632468F-4B62-4937-8CA6-5B8023451F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C853E612-2C4B-4595-AD6F-22E34B68C69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E61C16-55F9-4054-8CC2-38D5197A1FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892F72BE-B65F-4271-9042-3B459DFBB43C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B526DE1-EEA7-47E4-B291-09C02F018A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700DDE2E-922C-426F-8751-BADD15055AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4A0517-EF86-4655-B4B4-246ED3A84803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E3912E-11F7-421B-A5C4-35568A6E386B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360F3E49-D75A-4ACE-B775-14055272C861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5362C676-5002-4ABC-9C60-97D4B65A399D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FCA457-9074-4876-A21A-144F03CD6450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054583DC-AAF8-4BF0-AC13-5A488476C161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A9B13E-8CF7-4879-8C33-8E690291335F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A634C47-2FD6-4106-86B6-DD465A5394E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05DDA3F8-7207-4FC9-B491-F49418975D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09AEBD6-56E7-4D22-B300-C904464FE75F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F414ABC6-B95C-48ED-BC15-817356248776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D601E90-6F2A-4C66-97A2-152031C88DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C57A83D0-E043-4294-A61D-730FAE30CCEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71493AA2-49E9-4FF5-AC29-DC2426973EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C1E9625-A8CF-4D0F-BB0D-9FB91391D977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DAE7DA-E0D3-4434-AD75-C8894D939A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F96295-2E72-4C23-B973-791B4A2B63F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8555124-BAFA-45D4-8208-ED1172D55F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B9D9B5-807F-494B-9ED2-7F4BDB32432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089D71A-8D46-4819-80E9-8A29BCA47EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A145F8D-30D1-44B5-A95F-C996961F4B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C172E7A8-7AB9-4269-ADA7-494CC4F08C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jab:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E4321-D52D-4C16-8821-ED16529C9090\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC643B-AA58-42EA-A777-52FCF6065F9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFB57C3-6CDF-46D1-858D-D5234956653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330125E6-3645-40B5-8E64-009B622090B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D874DF-54A1-47C7-B3D9-A9CE41A42418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEF825D-E2DA-43E3-8193-301CE202506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1485E3A5-A586-408A-8325-7572779DD0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2244E538-6B35-44E0-B93E-60B773745A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DB6B2A-19D2-4684-B07F-5D42EC850A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC1C381-4795-4992-BE3C-9615E005DE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80188F84-30DE-46AC-8E0C-984126B77CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECBF0A9-D84F-40A2-AC61-A9C59C819787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F129CF-FB92-49E9-BD86-90DDB8218FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C288D58-F765-4403-BF18-CC0A62B1AA60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C910D02-A7FD-4338-8DF3-18682F1B4C36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D6C6EE-CFD9-49A9-8784-498560847737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEE60A6-9E75-4B20-A06D-411E774511B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1451BB33-6BE0-4F4A-A193-14E13DECEE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3CD43-F30A-484B-9285-D925C1262212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F807A36A-9363-40F1-9B20-E5C4D503EB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200C1CD-DEAB-44FD-970D-098F3E01F36B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E71841-512D-483C-A911-86EA745AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17F3285-80E8-4BE5-8704-3379CF326601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9669DF61-DDC5-498D-906A-494D56BAE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45D0EFD-784A-4CDB-8FDB-41F6869B4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942CC01D-ED6E-4731-A61B-75CDF219F760\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93197\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1036914\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…