Lucene search

K
ciscoCiscoCISCO-SA-20160928-CIP
HistorySep 28, 2016 - 4:00 p.m.

Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability

2016-09-2816:00:00
tools.cisco.com
15

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.006 Low

EPSS

Percentile

77.8%

A vulnerability in the Common Industrial Protocol (CIP) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition.

The vulnerability is due to a failure to properly process an unusual, but valid, set of requests to an affected device. An attacker could exploit this vulnerability by submitting a CIP message request designed to trigger the vulnerability to an affected device. An exploit could cause the switch to stop processing traffic, requiring a restart of the device to regain functionality.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip”]

This advisory is part of the September 28, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 11 vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of the advisories and links to them, see Cisco Event Response: September 2016 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication[“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-56513”].

Affected configurations

Vulners
Node
ciscoiosMatch12.2se
OR
ciscoiosMatch12.2ex
OR
ciscoiosMatch15.0ey
OR
ciscoiosMatch15.0se
OR
ciscoiosMatch15.0sg
OR
ciscoiosMatch15.0ex
OR
ciscoiosMatch15.0ea
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.2ey
OR
ciscoiosMatch15.2jaz
OR
ciscoiosMatch15.2ea
OR
ciscoiosMatch15.3jn
OR
ciscoiosMatch15.3ja
OR
ciscoiosMatch15.3jaa
OR
ciscoiosMatch15.3jab
OR
ciscoiosMatch15.3jb
OR
ciscoiosMatch15.3jnb
OR
ciscoiosMatch15.3jax
OR
ciscoiosMatch15.3jbb
OR
ciscoiosMatch15.3jc
OR
ciscoiosMatch15.3jnc
OR
ciscoiosMatch15.3jnp
OR
ciscoiosMatch15.3jpi
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(46\)se2
OR
ciscoiosMatch12.2\(50\)se2
OR
ciscoiosMatch12.2\(50\)se1
OR
ciscoiosMatch12.2\(50\)se5
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(52\)se
OR
ciscoiosMatch12.2\(58\)se
OR
ciscoiosMatch12.2\(50\)se3
OR
ciscoiosMatch12.2\(52\)se1
OR
ciscoiosMatch12.2\(46\)se1
OR
ciscoiosMatch12.2\(50\)se4
OR
ciscoiosMatch12.2\(50\)se
OR
ciscoiosMatch12.2\(58\)se1
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)se7
OR
ciscoiosMatch12.2\(55\)se8
OR
ciscoiosMatch12.2\(55\)se9
OR
ciscoiosMatch12.2\(55\)se10
OR
ciscoiosMatch12.2\(44\)ex
OR
ciscoiosMatch12.2\(44\)ex1
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey1
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(2\)ey
OR
ciscoiosMatch15.0\(2\)ey1
OR
ciscoiosMatch15.0\(2\)ey2
OR
ciscoiosMatch15.0\(2\)ey3
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(2\)se1
OR
ciscoiosMatch15.0\(2\)se2
OR
ciscoiosMatch15.0\(2\)se3
OR
ciscoiosMatch15.0\(2\)se4
OR
ciscoiosMatch15.0\(2\)se5
OR
ciscoiosMatch15.0\(2\)se6
OR
ciscoiosMatch15.0\(2\)se7
OR
ciscoiosMatch15.0\(2\)se8
OR
ciscoiosMatch15.0\(2\)se9
OR
ciscoiosMatch15.0\(2\)sg11a
OR
ciscoiosMatch15.0\(2\)ex2
OR
ciscoiosMatch15.0\(2\)ex8
OR
ciscoiosMatch15.0\(2\)ea1
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2b\)e
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2\)e3
OR
ciscoiosMatch15.2\(2\)e4
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.2\(4\)jaz
OR
ciscoiosMatch15.2\(4\)jaz1
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.3\(3\)jn
OR
ciscoiosMatch15.3\(3\)jn1
OR
ciscoiosMatch15.3\(3\)jn2
OR
ciscoiosMatch15.3\(3\)jn3
OR
ciscoiosMatch15.3\(3\)jn4
OR
ciscoiosMatch15.3\(3\)jn6
OR
ciscoiosMatch15.3\(3\)jn7
OR
ciscoiosMatch15.3\(3\)jn8
OR
ciscoiosMatch15.3\(3\)ja
OR
ciscoiosMatch15.3\(3\)ja1n
OR
ciscoiosMatch15.3\(3\)ja1m
OR
ciscoiosMatch15.3\(3\)ja1
OR
ciscoiosMatch15.3\(3\)ja2
OR
ciscoiosMatch15.3\(3\)ja3
OR
ciscoiosMatch15.3\(3\)ja4
OR
ciscoiosMatch15.3\(3\)ja5
OR
ciscoiosMatch15.3\(3\)ja7
OR
ciscoiosMatch15.3\(3\)ja8
OR
ciscoiosMatch15.3\(3\)jaa
OR
ciscoiosMatch15.3\(3\)jaa1
OR
ciscoiosMatch15.3\(3\)jab
OR
ciscoiosMatch15.3\(3\)jb
OR
ciscoiosMatch15.3\(3\)jnb
OR
ciscoiosMatch15.3\(3\)jnb1
OR
ciscoiosMatch15.3\(3\)jnb2
OR
ciscoiosMatch15.3\(3\)jnb3
OR
ciscoiosMatch15.3\(3\)jax
OR
ciscoiosMatch15.3\(3\)jax1
OR
ciscoiosMatch15.3\(3\)jax2
OR
ciscoiosMatch15.3\(3\)jbb
OR
ciscoiosMatch15.3\(3\)jbb1
OR
ciscoiosMatch15.3\(3\)jbb2
OR
ciscoiosMatch15.3\(3\)jbb4
OR
ciscoiosMatch15.3\(3\)jbb5
OR
ciscoiosMatch15.3\(3\)jbb6
OR
ciscoiosMatch15.3\(3\)jbb8
OR
ciscoiosMatch15.3\(3\)jbb6a
OR
ciscoiosMatch15.3\(3\)jc
OR
ciscoiosMatch15.3\(3\)jnc
OR
ciscoiosMatch15.3\(3\)jnc1
OR
ciscoiosMatch15.3\(3\)jnp
OR
ciscoiosMatch15.3\(3\)jnp1
OR
ciscoiosMatch15.3\(3\)jpi
OR
ciscoiosMatch15.3\(3\)jpi3
Rows per page:
1-10 of 1221

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.006 Low

EPSS

Percentile

77.8%

Related for CISCO-SA-20160928-CIP