Lucene search

K
ciscoCiscoCISCO-SA-20160928-FRAG
HistorySep 28, 2016 - 4:00 p.m.

Cisco IOS XE Software IP Fragment Reassembly Denial of Service Vulnerability

2016-09-2816:00:00
tools.cisco.com
13

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

77.8%

A vulnerability in the IPv4 fragment reassembly function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.

The vulnerability is due to the corruption of an internal data structure that occurs when the affected software reassembles an IPv4 packet. An attacker could exploit this vulnerability by sending crafted IPv4 fragments to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag”]

This advisory is part of the September 28, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 11 vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of the advisories and links to them, see Cisco Event Response: September 2016 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication[“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-56513”].

Affected configurations

Vulners
Node
ciscocisco_iosMatch3.2sgxe
OR
ciscocisco_iosMatch3.7sxe
OR
ciscocisco_iosMatch3.3sgxe
OR
ciscocisco_iosMatch3.8sxe
OR
ciscocisco_iosMatch3.9sxe
OR
ciscocisco_iosMatch3.2sexe
OR
ciscocisco_iosMatch3.3sexe
OR
ciscocisco_iosMatch3.3xoxe
OR
ciscocisco_iosMatch3.4sgxe
OR
ciscocisco_iosMatch3.5exe
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.11sxe
OR
ciscocisco_iosMatch3.12sxe
OR
ciscocisco_iosMatch3.13sxe
OR
ciscocisco_iosMatch3.6exe
OR
ciscocisco_iosMatch3.14sxe
OR
ciscocisco_iosMatch3.15sxe
OR
ciscocisco_iosMatch3.3sqxe
OR
ciscocisco_iosMatch3.4sqxe
OR
ciscocisco_iosMatch3.7exe
OR
ciscocisco_iosMatch3.5sqxe
OR
ciscocisco_iosMatch3.16sxe
OR
ciscocisco_iosMatch3.17sxe
OR
ciscocisco_iosMatch16.1xe
OR
ciscocisco_iosMatch3.8exe
OR
ciscocisco_iosMatch3.2.0sgxe
OR
ciscocisco_iosMatch3.2.1sgxe
OR
ciscocisco_iosMatch3.2.2sgxe
OR
ciscocisco_iosMatch3.2.3sgxe
OR
ciscocisco_iosMatch3.2.4sgxe
OR
ciscocisco_iosMatch3.2.5sgxe
OR
ciscocisco_iosMatch3.2.6sgxe
OR
ciscocisco_iosMatch3.2.7sgxe
OR
ciscocisco_iosMatch3.2.8sgxe
OR
ciscocisco_iosMatch3.2.9sgxe
OR
ciscocisco_iosMatch3.2.10sgxe
OR
ciscocisco_iosMatch3.7.0sxe
OR
ciscocisco_iosMatch3.7.1sxe
OR
ciscocisco_iosMatch3.7.2sxe
OR
ciscocisco_iosMatch3.7.3sxe
OR
ciscocisco_iosMatch3.7.4sxe
OR
ciscocisco_iosMatch3.7.5sxe
OR
ciscocisco_iosMatch3.7.6sxe
OR
ciscocisco_iosMatch3.7.7sxe
OR
ciscocisco_iosMatch3.7.8sxe
OR
ciscocisco_iosMatch3.7.4asxe
OR
ciscocisco_iosMatch3.7.2tsxe
OR
ciscocisco_iosMatch3.7.0bsxe
OR
ciscocisco_iosMatch3.7.1asxe
OR
ciscocisco_iosMatch3.3.0sgxe
OR
ciscocisco_iosMatch3.3.2sgxe
OR
ciscocisco_iosMatch3.3.1sgxe
OR
ciscocisco_iosMatch3.8.0sxe
OR
ciscocisco_iosMatch3.8.1sxe
OR
ciscocisco_iosMatch3.8.2sxe
OR
ciscocisco_iosMatch3.9.1sxe
OR
ciscocisco_iosMatch3.9.0sxe
OR
ciscocisco_iosMatch3.9.2sxe
OR
ciscocisco_iosMatch3.9.0xasxe
OR
ciscocisco_iosMatch3.9.1asxe
OR
ciscocisco_iosMatch3.9.0asxe
OR
ciscocisco_iosMatch3.2.0sexe
OR
ciscocisco_iosMatch3.2.1sexe
OR
ciscocisco_iosMatch3.2.2sexe
OR
ciscocisco_iosMatch3.2.3sexe
OR
ciscocisco_iosMatch3.3.0sexe
OR
ciscocisco_iosMatch3.3.1sexe
OR
ciscocisco_iosMatch3.3.2sexe
OR
ciscocisco_iosMatch3.3.3sexe
OR
ciscocisco_iosMatch3.3.4sexe
OR
ciscocisco_iosMatch3.3.5sexe
OR
ciscocisco_iosMatch3.3.0xoxe
OR
ciscocisco_iosMatch3.3.1xoxe
OR
ciscocisco_iosMatch3.3.2xoxe
OR
ciscocisco_iosMatch3.4.0sgxe
OR
ciscocisco_iosMatch3.4.2sgxe
OR
ciscocisco_iosMatch3.4.1sgxe
OR
ciscocisco_iosMatch3.4.3sgxe
OR
ciscocisco_iosMatch3.4.4sgxe
OR
ciscocisco_iosMatch3.4.5sgxe
OR
ciscocisco_iosMatch3.4.6sgxe
OR
ciscocisco_iosMatch3.4.7sgxe
OR
ciscocisco_iosMatch3.5.0exe
OR
ciscocisco_iosMatch3.5.1exe
OR
ciscocisco_iosMatch3.5.2exe
OR
ciscocisco_iosMatch3.5.3exe
OR
ciscocisco_iosMatch3.10.0sxe
OR
ciscocisco_iosMatch3.10.1sxe
OR
ciscocisco_iosMatch3.10.2sxe
OR
ciscocisco_iosMatch3.10.3sxe
OR
ciscocisco_iosMatch3.10.4sxe
OR
ciscocisco_iosMatch3.10.5sxe
OR
ciscocisco_iosMatch3.10.6sxe
OR
ciscocisco_iosMatch3.10.2asxe
OR
ciscocisco_iosMatch3.10.2tsxe
OR
ciscocisco_iosMatch3.10.7sxe
OR
ciscocisco_iosMatch3.10.1xbsxe
OR
ciscocisco_iosMatch3.11.1sxe
OR
ciscocisco_iosMatch3.11.2sxe
OR
ciscocisco_iosMatch3.11.0sxe
OR
ciscocisco_iosMatch3.11.3sxe
OR
ciscocisco_iosMatch3.11.4sxe
OR
ciscocisco_iosMatch3.12.0sxe
OR
ciscocisco_iosMatch3.12.1sxe
OR
ciscocisco_iosMatch3.12.2sxe
OR
ciscocisco_iosMatch3.12.3sxe
OR
ciscocisco_iosMatch3.12.0asxe
OR
ciscocisco_iosMatch3.12.4sxe
OR
ciscocisco_iosMatch3.13.0sxe
OR
ciscocisco_iosMatch3.13.1sxe
OR
ciscocisco_iosMatch3.13.2sxe
OR
ciscocisco_iosMatch3.13.3sxe
OR
ciscocisco_iosMatch3.13.4sxe
OR
ciscocisco_iosMatch3.13.2asxe
OR
ciscocisco_iosMatch3.13.0asxe
OR
ciscocisco_iosMatch3.6.0exe
OR
ciscocisco_iosMatch3.6.1exe
OR
ciscocisco_iosMatch3.6.0aexe
OR
ciscocisco_iosMatch3.6.0bexe
OR
ciscocisco_iosMatch3.6.2aexe
OR
ciscocisco_iosMatch3.6.2exe
OR
ciscocisco_iosMatch3.6.3exe
OR
ciscocisco_iosMatch3.6.4exe
OR
ciscocisco_iosMatch3.14.0sxe
OR
ciscocisco_iosMatch3.14.1sxe
OR
ciscocisco_iosMatch3.14.2sxe
OR
ciscocisco_iosMatch3.14.3sxe
OR
ciscocisco_iosMatch3.14.4sxe
OR
ciscocisco_iosMatch3.15.0sxe
OR
ciscocisco_iosMatch3.15.1sxe
OR
ciscocisco_iosMatch3.15.2sxe
OR
ciscocisco_iosMatch3.15.1csxe
OR
ciscocisco_iosMatch3.3.0sqxe
OR
ciscocisco_iosMatch3.3.1sqxe
OR
ciscocisco_iosMatch3.4.0sqxe
OR
ciscocisco_iosMatch3.4.1sqxe
OR
ciscocisco_iosMatch3.7.0exe
OR
ciscocisco_iosMatch3.7.1exe
OR
ciscocisco_iosMatch3.7.2exe
OR
ciscocisco_iosMatch3.7.3exe
OR
ciscocisco_iosMatch3.5.0sqxe
OR
ciscocisco_iosMatch3.5.1sqxe
OR
ciscocisco_iosMatch3.5.2sqxe
OR
ciscocisco_iosMatch3.5.3sqxe
OR
ciscocisco_iosMatch3.5.4sqxe
OR
ciscocisco_iosMatch3.5.5sqxe
OR
ciscocisco_iosMatch3.5.6sqxe
OR
ciscocisco_iosMatch3.16.0sxe
OR
ciscocisco_iosMatch3.16.1sxe
OR
ciscocisco_iosMatch3.16.0asxe
OR
ciscocisco_iosMatch3.16.1asxe
OR
ciscocisco_iosMatch3.16.0csxe
OR
ciscocisco_iosMatch3.17.0sxe
OR
ciscocisco_iosMatch16.1.1xe
OR
ciscocisco_iosMatch16.1.2xe
OR
ciscocisco_iosMatch16.1.3xe
OR
ciscocisco_iosMatch3.8.0exe
OR
ciscocisco_iosMatch3.8.1exe
VendorProductVersionCPE
ciscocisco_ios3.2sgcpe:2.3:o:cisco:cisco_ios:3.2sg:xe:*:*:*:*:*:*
ciscocisco_ios3.7scpe:2.3:o:cisco:cisco_ios:3.7s:xe:*:*:*:*:*:*
ciscocisco_ios3.3sgcpe:2.3:o:cisco:cisco_ios:3.3sg:xe:*:*:*:*:*:*
ciscocisco_ios3.8scpe:2.3:o:cisco:cisco_ios:3.8s:xe:*:*:*:*:*:*
ciscocisco_ios3.9scpe:2.3:o:cisco:cisco_ios:3.9s:xe:*:*:*:*:*:*
ciscocisco_ios3.2secpe:2.3:o:cisco:cisco_ios:3.2se:xe:*:*:*:*:*:*
ciscocisco_ios3.3secpe:2.3:o:cisco:cisco_ios:3.3se:xe:*:*:*:*:*:*
ciscocisco_ios3.3xocpe:2.3:o:cisco:cisco_ios:3.3xo:xe:*:*:*:*:*:*
ciscocisco_ios3.4sgcpe:2.3:o:cisco:cisco_ios:3.4sg:xe:*:*:*:*:*:*
ciscocisco_ios3.5ecpe:2.3:o:cisco:cisco_ios:3.5e:xe:*:*:*:*:*:*
Rows per page:
1-10 of 1581

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

77.8%

Related for CISCO-SA-20160928-FRAG