First published: Thu Mar 24 2016(Updated: )
The Wide Area Application Services (WAAS) Express implementation in Cisco IOS 15.1 through 15.5 allows remote attackers to cause a denial of service (device reload) via a crafted TCP segment, aka Bug ID CSCuq59708.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1\(4\)gc2 | |
Cisco IOS | =15.1\(4\)m6 | |
Cisco IOS | =15.1\(4\)xb4 | |
Cisco IOS | =15.1\(4\)xb5 | |
Cisco IOS | =15.1\(4\)xb5a | |
Cisco IOS | =15.1\(4\)xb6 | |
Cisco IOS | =15.1\(4\)xb7 | |
Cisco IOS | =15.1\(4\)xb8 | |
Cisco IOS | =15.1\(4\)xb8a | |
Cisco IOS | =15.2\(4\)jaz1 | |
Cisco IOS | =15.2\(4\)m7 | |
Cisco IOS | =15.3\(1\)t2 | |
Cisco IOS | =15.3\(3\)jaa1 | |
Cisco IOS | =15.3\(3\)m | |
Cisco IOS | =15.3\(3\)m3 | |
Cisco IOS | =15.3\(3\)m4 | |
Cisco IOS | =15.3\(3\)m6 | |
Cisco IOS | =15.4\(1\)t | |
Cisco IOS | =15.4\(1\)t1 | |
Cisco IOS | =15.4\(1\)t2 | |
Cisco IOS | =15.4\(2\)t | |
Cisco IOS | =15.4\(2\)t1 | |
Cisco IOS | =15.4\(2\)t2 | |
Cisco IOS | =15.4\(2\)t3 | |
Cisco IOS | =15.4\(2\)t4 | |
Cisco IOS | =15.4\(3\)m | |
Cisco IOS | =15.4\(3\)m1 | |
Cisco IOS | =15.4\(3\)m2 | |
Cisco IOS | =15.4\(3\)m3 | |
Cisco IOS | =15.5\(2\)t1 | |
Cisco IOS | =15.5\(2\)t2 | |
Cisco IOS | =15.5\(2\)t3 | |
Cisco IOS | =15.5\(3\)m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1347 is classified as a high severity vulnerability due to its potential to cause denial of service by triggering device reloads.
To fix CVE-2016-1347, update to a patched version of Cisco IOS that addresses this vulnerability.
CVE-2016-1347 affects Cisco IOS versions 15.1 through 15.5, including specific releases within those versions.
Exploitation of CVE-2016-1347 can lead to a denial of service, causing affected devices to unexpectedly reload.
Yes, CVE-2016-1347 can be exploited remotely by attackers sending crafted TCP segments to the affected devices.