fkie_cve-2016-1348
Vulnerability from fkie_nvd
Published
2016-03-26 01:59
Modified
2024-11-21 02:46
Severity ?
Summary
Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios_xe | 3.3xo_3.3.0xo | |
cisco | ios_xe | 3.3xo_3.3.1xo | |
cisco | ios_xe | 3.3xo_3.3.2xo | |
cisco | ios_xe | 3.5e_3.5.0e | |
cisco | ios_xe | 3.5e_3.5.1e | |
cisco | ios_xe | 3.5e_3.5.2e | |
cisco | ios_xe | 3.5e_3.5.3e | |
cisco | ios_xe | 3.5s_3.5.0s | |
cisco | ios_xe | 3.5s_3.5.1s | |
cisco | ios_xe | 3.5s_3.5.2s | |
cisco | ios_xe | 3.6e_3.6.0e | |
cisco | ios_xe | 3.6e_3.6.1e | |
cisco | ios_xe | 3.6e_3.6.2ae | |
cisco | ios_xe | 3.6e_3.6.2e | |
cisco | ios_xe | 3.6e_3.6.3e | |
cisco | ios_xe | 3.6s_3.6.0s | |
cisco | ios_xe | 3.6s_3.6.1s | |
cisco | ios_xe | 3.6s_3.6.2s | |
cisco | ios_xe | 3.7e_3.7.0e | |
cisco | ios_xe | 3.7e_3.7.1e | |
cisco | ios_xe | 3.7e_3.7.2e | |
cisco | ios_xe | 3.7s_3.7.0s | |
cisco | ios_xe | 3.7s_3.7.1s | |
cisco | ios_xe | 3.7s_3.7.2s | |
cisco | ios_xe | 3.7s_3.7.2ts | |
cisco | ios_xe | 3.7s_3.7.3s | |
cisco | ios_xe | 3.7s_3.7.4as | |
cisco | ios_xe | 3.7s_3.7.4s | |
cisco | ios_xe | 3.7s_3.7.5s | |
cisco | ios_xe | 3.7s_3.7.6s | |
cisco | ios_xe | 3.7s_3.7.7s | |
cisco | ios_xe | 3.8e_3.8.0e | |
cisco | ios_xe | 3.8s_3.8.0s | |
cisco | ios_xe | 3.8s_3.8.1s | |
cisco | ios_xe | 3.8s_3.8.2s | |
cisco | ios_xe | 3.9s_3.9.0as | |
cisco | ios_xe | 3.9s_3.9.0s | |
cisco | ios_xe | 3.9s_3.9.1as | |
cisco | ios_xe | 3.9s_3.9.1s | |
cisco | ios_xe | 3.9s_3.9.2s | |
cisco | ios_xe | 3.10s_3.10.0s | |
cisco | ios_xe | 3.10s_3.10.1s | |
cisco | ios_xe | 3.10s_3.10.1xbs | |
cisco | ios_xe | 3.10s_3.10.2s | |
cisco | ios_xe | 3.10s_3.10.3s | |
cisco | ios_xe | 3.10s_3.10.4s | |
cisco | ios_xe | 3.10s_3.10.5s | |
cisco | ios_xe | 3.10s_3.10.6s | |
cisco | ios_xe | 3.11s_3.11.0s | |
cisco | ios_xe | 3.11s_3.11.1s | |
cisco | ios_xe | 3.11s_3.11.2s | |
cisco | ios_xe | 3.11s_3.11.3s | |
cisco | ios_xe | 3.11s_3.11.4s | |
cisco | ios_xe | 3.12s_3.12.0s | |
cisco | ios_xe | 3.12s_3.12.1s | |
cisco | ios_xe | 3.12s_3.12.2s | |
cisco | ios_xe | 3.12s_3.12.3s | |
cisco | ios_xe | 3.12s_3.12.4s | |
cisco | ios_xe | 3.13s_3.13.0as | |
cisco | ios_xe | 3.13s_3.13.0s | |
cisco | ios_xe | 3.13s_3.13.1s | |
cisco | ios_xe | 3.13s_3.13.2as | |
cisco | ios_xe | 3.13s_3.13.2s | |
cisco | ios_xe | 3.13s_3.13.3s | |
cisco | ios_xe | 3.13s_3.13.4s | |
cisco | ios_xe | 3.14s_3.14.0s | |
cisco | ios_xe | 3.14s_3.14.1s | |
cisco | ios_xe | 3.14s_3.14.2s | |
cisco | ios_xe | 3.14s_3.14.3s | |
cisco | ios_xe | 3.15s_3.15.0s | |
cisco | ios_xe | 3.15s_3.15.1cs | |
cisco | ios_xe | 3.15s_3.15.1s | |
cisco | ios_xe | 3.15s_3.15.2s | |
cisco | ios_xe | 3.16s_3.16.0cs | |
cisco | ios_xe | 3.16s_3.16.0s | |
cisco | ios_xe | 3.16s_3.16.1as | |
cisco | ios_xe | 3.16s_3.16.1s | |
netgear | jr6150_firmware | * | |
samsung | x14j_firmware | t-ms14jakucb-1102.5 | |
sun | opensolaris | snv_124 | |
zyxel | gs1900-10hp_firmware | * | |
zzinc | keymouse_firmware | 3.08 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.0xo:*:*:*:*:*:*:*", "matchCriteriaId": "1048CA2D-FFA2-4D44-8F2E-3ECFD7A97E55", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.1xo:*:*:*:*:*:*:*", "matchCriteriaId": "BFCA15E2-9FBC-49C7-BF47-7B749A11914B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.2xo:*:*:*:*:*:*:*", "matchCriteriaId": "F01AADBF-D870-4B75-9C34-82B534995C47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.0e:*:*:*:*:*:*:*", "matchCriteriaId": "34C96C5E-C67E-42DB-A400-872C72723397", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.1e:*:*:*:*:*:*:*", "matchCriteriaId": "036EB6B4-3EBA-4AC2-A182-9402257E7D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.2e:*:*:*:*:*:*:*", "matchCriteriaId": "2AB451EE-C76B-405A-9AEF-28420E9D964D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.3e:*:*:*:*:*:*:*", "matchCriteriaId": "9D070F4E-0539-45C2-B5FC-486135DCA5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5s_3.5.0s:*:*:*:*:*:*:*", "matchCriteriaId": "D03DF484-5044-40A0-90D5-010A4EACB884", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5s_3.5.1s:*:*:*:*:*:*:*", "matchCriteriaId": "C06826A5-1E47-43F8-BA06-DCEE41B1D298", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5s_3.5.2s:*:*:*:*:*:*:*", "matchCriteriaId": "EF975D9D-126B-4E0B-BA5E-7E4A429275F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.0e:*:*:*:*:*:*:*", "matchCriteriaId": "46D09504-050B-477B-A77C-DC6FB356573C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.1e:*:*:*:*:*:*:*", "matchCriteriaId": "E7515382-E7F8-4309-89F7-D2A0CDBCFE14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.2ae:*:*:*:*:*:*:*", "matchCriteriaId": "4849EC40-FC9C-48A6-B0E1-F084737DC860", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.2e:*:*:*:*:*:*:*", "matchCriteriaId": "1B217689-9550-4465-9252-95BB53B3165E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.3e:*:*:*:*:*:*:*", "matchCriteriaId": "5B662063-15FE-46A0-97D5-A10A8C44D2A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6s_3.6.0s:*:*:*:*:*:*:*", "matchCriteriaId": "33FADC21-F6C7-4D97-94C7-3552C3A5830E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6s_3.6.1s:*:*:*:*:*:*:*", "matchCriteriaId": "39FA1C3D-01CB-4E26-9F81-6F53B6195083", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6s_3.6.2s:*:*:*:*:*:*:*", "matchCriteriaId": "65CB65CA-4427-491D-BB64-A4D9D9EAE8D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7e_3.7.0e:*:*:*:*:*:*:*", "matchCriteriaId": "B5141179-58CC-42CC-B7C3-881E452BAF0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7e_3.7.1e:*:*:*:*:*:*:*", "matchCriteriaId": "0F4F220A-ADA8-4D51-A41F-DC9607285940", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7e_3.7.2e:*:*:*:*:*:*:*", "matchCriteriaId": "21577E9B-D717-43EA-AB71-533BCDD1379D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.0s:*:*:*:*:*:*:*", "matchCriteriaId": "E677D95D-14DC-475D-978D-6E2A11FD7F8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.1s:*:*:*:*:*:*:*", "matchCriteriaId": "5CE969A4-9810-42DF-A92C-CD488CEB1150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.2s:*:*:*:*:*:*:*", "matchCriteriaId": "C2CEB4AE-C963-4E8D-923D-8940E93BE51C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.2ts:*:*:*:*:*:*:*", "matchCriteriaId": "61E4FE90-CADD-4A39-A343-8C688FA4EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.3s:*:*:*:*:*:*:*", "matchCriteriaId": "48F5CB41-DC88-42D0-A7AD-F8DAA5386554", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.4as:*:*:*:*:*:*:*", "matchCriteriaId": "97399C68-252F-4B89-A20F-A15C5BC51DDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.4s:*:*:*:*:*:*:*", "matchCriteriaId": "6B648A93-E55B-487F-B6EE-2E97ED21BED7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.5s:*:*:*:*:*:*:*", "matchCriteriaId": "287DE66C-0EA8-4404-A42E-11776B3D7852", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.6s:*:*:*:*:*:*:*", "matchCriteriaId": "8D3F59AE-7E69-4694-AFBF-CE278B3BE32F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.7s:*:*:*:*:*:*:*", "matchCriteriaId": "A95E7272-57D4-4DCC-A3B1-82C477439177", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8e_3.8.0e:*:*:*:*:*:*:*", "matchCriteriaId": "0FFE5D14-0382-4BEB-988C-AC9982F8798F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8s_3.8.0s:*:*:*:*:*:*:*", "matchCriteriaId": "532A0CC6-614F-4690-A845-E4CB2C05AEE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8s_3.8.1s:*:*:*:*:*:*:*", "matchCriteriaId": "ED4A9A0A-3DB5-4BE4-B6F7-3BE491C4F973", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8s_3.8.2s:*:*:*:*:*:*:*", "matchCriteriaId": "23A5201B-747B-4525-8707-F097051AD0A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.0as:*:*:*:*:*:*:*", "matchCriteriaId": "3F66E1DA-94E4-4AEE-BCF6-022B8E966C65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.0s:*:*:*:*:*:*:*", "matchCriteriaId": "43082336-50F9-49D2-91EF-823249F2366B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.1as:*:*:*:*:*:*:*", "matchCriteriaId": "FBD67821-EEBE-49D4-8AAB-4FF81370A976", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.1s:*:*:*:*:*:*:*", "matchCriteriaId": "7F2B3E54-746F-48B7-8DA4-4827BC450841", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.2s:*:*:*:*:*:*:*", "matchCriteriaId": "FE4657ED-003D-48C1-9744-56AA825C96AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.0s:*:*:*:*:*:*:*", "matchCriteriaId": "E659A9C2-4E00-45F3-8F70-D9E18CDEE8D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1s:*:*:*:*:*:*:*", "matchCriteriaId": "4B359E9A-65D2-447D-AA44-BEA158622923", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1xbs:*:*:*:*:*:*:*", "matchCriteriaId": "B217F6BD-D867-459A-AC5E-760F0BD36602", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2s:*:*:*:*:*:*:*", "matchCriteriaId": "8E1B040D-CE1A-41A3-B0E9-1AA0CFC29899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.3s:*:*:*:*:*:*:*", "matchCriteriaId": "C2CE31EB-5B95-49EC-8955-0D47DDA344CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.4s:*:*:*:*:*:*:*", "matchCriteriaId": "FD279792-84E4-4E9C-9DBD-2E0689279981", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.5s:*:*:*:*:*:*:*", "matchCriteriaId": "67CF54E1-2890-4F70-81A1-04AFB98CC2BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.6s:*:*:*:*:*:*:*", "matchCriteriaId": "137FCB00-9FD5-4C45-9DE4-EC4BB2679049", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.0s:*:*:*:*:*:*:*", "matchCriteriaId": "186A4D4A-5977-45BC-A054-72B20FA574FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.1s:*:*:*:*:*:*:*", "matchCriteriaId": "4DEF72D7-D889-4197-8469-A849050DE808", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.2s:*:*:*:*:*:*:*", "matchCriteriaId": "737754AA-C961-433E-B9D0-7C7ED0310F0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.3s:*:*:*:*:*:*:*", "matchCriteriaId": "AFCFC44D-F618-457B-BD53-F09224F1C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.4s:*:*:*:*:*:*:*", "matchCriteriaId": "8BC5C495-4CFE-4126-A358-5E4B40D17CC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C2BB58F-437A-4051-8FC4-C16CFD99AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.1s:*:*:*:*:*:*:*", "matchCriteriaId": "348B6EB5-4DCF-41EA-BD36-C2A150F0F55C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.2s:*:*:*:*:*:*:*", "matchCriteriaId": "588F5074-C8F3-4D62-89BF-EE0E3945921E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.3s:*:*:*:*:*:*:*", "matchCriteriaId": "42D06EFA-5E74-4868-99DE-81278EA12119", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.4s:*:*:*:*:*:*:*", "matchCriteriaId": "7F16B0E5-30F9-4C2A-A492-F0EF522843A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0as:*:*:*:*:*:*:*", "matchCriteriaId": "73D0F3A6-14D7-4E83-A2E2-2D0FD545DD6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0s:*:*:*:*:*:*:*", "matchCriteriaId": "663B2239-BC08-4C0C-A16C-FA7CFD0B1F1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.1s:*:*:*:*:*:*:*", "matchCriteriaId": "27806BF7-0971-4F71-A0CC-A9FADEF40F22", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.2as:*:*:*:*:*:*:*", "matchCriteriaId": "B6D9A836-B48E-4961-B51C-2014D2859922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.2s:*:*:*:*:*:*:*", "matchCriteriaId": "AF0A7ED7-901B-4382-8666-E65A6880C756", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.3s:*:*:*:*:*:*:*", "matchCriteriaId": "DC8FBD67-6D74-44EB-A86D-DD8C98DA4998", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.4s:*:*:*:*:*:*:*", "matchCriteriaId": "42425169-F2EE-4157-9AA6-CF1B4FD12B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.0s:*:*:*:*:*:*:*", "matchCriteriaId": "3E1BE381-4C2A-45B1-9647-FB1581BF687A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.1s:*:*:*:*:*:*:*", "matchCriteriaId": "398B04EF-01AD-4C91-B141-0266886AEED2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.2s:*:*:*:*:*:*:*", "matchCriteriaId": "F103A8AB-E32B-487D-9640-5CBB33E0FF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.3s:*:*:*:*:*:*:*", "matchCriteriaId": "FDA1DC5E-8504-4617-A1FC-86B3F912D556", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.0s:*:*:*:*:*:*:*", "matchCriteriaId": "26E62379-6C6E-4B50-97FF-6183F048750F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1cs:*:*:*:*:*:*:*", "matchCriteriaId": "6BEB3538-C2E0-4C44-ACE2-A022A118105F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1s:*:*:*:*:*:*:*", "matchCriteriaId": "FD1C0761-BC14-4FD7-B852-88EAB4E78F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.2s:*:*:*:*:*:*:*", "matchCriteriaId": "D9C5187C-C7E0-4446-B528-C5DE1AAB90ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.0cs:*:*:*:*:*:*:*", "matchCriteriaId": "70C6DF0C-DC72-43FD-AD44-563075885D7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.0s:*:*:*:*:*:*:*", "matchCriteriaId": "6CB7CB45-0D3C-450F-A4F4-048D4266693B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.1as:*:*:*:*:*:*:*", "matchCriteriaId": "ACDEE8CE-B4E5-4E2F-81D9-3CCECAB234E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.1s:*:*:*:*:*:*:*", "matchCriteriaId": "13282A28-8990-4585-93E4-38384E1D174D", "vulnerable": true }, { "criteria": "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF", "versionEndExcluding": "2017-01-06", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A5867B4-EC19-45D4-87BE-867E1D41ECD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0", "vulnerable": true }, { "criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*", "matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821." }, { "lang": "es", "value": "Cisco IOS 15.0 hasta la versi\u00f3n 15.5 y IOS XE 3.3 hasta la versi\u00f3n 3.16 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje DHCPv6 Relay manipulado, tambi\u00e9n conocido como Bug ID CSCus55821." } ], "id": "CVE-2016-1348", "lastModified": "2024-11-21T02:46:13.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-03-26T01:59:02.200", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1035381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035381" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.