Lucene search

K
nvd[email protected]NVD:CVE-2016-6391
HistoryOct 05, 2016 - 8:59 p.m.

CVE-2016-6391

2016-10-0520:59:06
CWE-399
web.nvd.nist.gov
2

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%

Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.

Affected configurations

NVD
Node
ciscoiosMatch12.2\(44\)ex
OR
ciscoiosMatch12.2\(44\)ex1
OR
ciscoiosMatch12.2\(46\)se
OR
ciscoiosMatch12.2\(46\)se1
OR
ciscoiosMatch12.2\(46\)se2
OR
ciscoiosMatch12.2\(50\)se
OR
ciscoiosMatch12.2\(50\)se1
OR
ciscoiosMatch12.2\(50\)se2
OR
ciscoiosMatch12.2\(50\)se3
OR
ciscoiosMatch12.2\(50\)se4
OR
ciscoiosMatch12.2\(50\)se5
OR
ciscoiosMatch12.2\(52\)se
OR
ciscoiosMatch12.2\(52\)se1
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)se7
OR
ciscoiosMatch12.2\(55\)se8
OR
ciscoiosMatch12.2\(55\)se9
OR
ciscoiosMatch12.2\(55\)se10
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey1
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(2\)eb
OR
ciscoiosMatch15.0\(2\)ey
OR
ciscoiosMatch15.0\(2\)ey1
OR
ciscoiosMatch15.0\(2\)ey2
OR
ciscoiosMatch15.0\(2\)ey3
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(2\)se1
OR
ciscoiosMatch15.0\(2\)se2
OR
ciscoiosMatch15.0\(2\)se3
OR
ciscoiosMatch15.0\(2\)se4
OR
ciscoiosMatch15.0\(2\)se5
OR
ciscoiosMatch15.0\(2\)se6
OR
ciscoiosMatch15.0\(2\)se7
OR
ciscoiosMatch15.0\(2\)se9
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2\)e4
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.3\(3\)ja
OR
ciscoiosMatch15.3\(3\)ja1
OR
ciscoiosMatch15.3\(3\)ja1m
OR
ciscoiosMatch15.3\(3\)ja1n
OR
ciscoiosMatch15.3\(3\)ja4
OR
ciscoiosMatch15.3\(3\)ja5
OR
ciscoiosMatch15.3\(3\)ja7
OR
ciscoiosMatch15.3\(3\)ja8
OR
ciscoiosMatch15.3\(3\)ja9
OR
ciscoiosMatch15.3\(3\)ja77
OR
ciscoiosMatch15.3\(3\)jaa
OR
ciscoiosMatch15.3\(3\)jab
OR
ciscoiosMatch15.3\(3\)jax
OR
ciscoiosMatch15.3\(3\)jax1
OR
ciscoiosMatch15.3\(3\)jax2
OR
ciscoiosMatch15.3\(3\)jb
OR
ciscoiosMatch15.3\(3\)jb75
OR
ciscoiosMatch15.3\(3\)jbb
OR
ciscoiosMatch15.3\(3\)jbb1
OR
ciscoiosMatch15.3\(3\)jbb2
OR
ciscoiosMatch15.3\(3\)jbb4
OR
ciscoiosMatch15.3\(3\)jbb5
OR
ciscoiosMatch15.3\(3\)jbb6
OR
ciscoiosMatch15.3\(3\)jbb6a
OR
ciscoiosMatch15.3\(3\)jbb8
OR
ciscoiosMatch15.3\(3\)jbb50
OR
ciscoiosMatch15.3\(3\)jc
OR
ciscoiosMatch15.3\(3\)jn3
OR
ciscoiosMatch15.3\(3\)jn4
OR
ciscoiosMatch15.3\(3\)jn7
OR
ciscoiosMatch15.3\(3\)jn8
OR
ciscoiosMatch15.3\(3\)jnb
OR
ciscoiosMatch15.3\(3\)jnb1
OR
ciscoiosMatch15.3\(3\)jnb2
OR
ciscoiosMatch15.3\(3\)jnb3
OR
ciscoiosMatch15.3\(3\)jnc
OR
ciscoiosMatch15.3\(3\)jnc1
OR
ciscoiosMatch15.3\(3\)jnp
OR
ciscoiosMatch15.3\(3\)jnp1

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%