First published: Sat Mar 26 2016(Updated: )
The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.1 and 15.2 and NX-OS 4.1 through 6.2 allows remote attackers to cause a denial of service (device reload) via a crafted header in a packet, aka Bug ID CSCuu64279.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1\(1\)sy1 | |
Cisco IOS | =15.1\(1\)sy2 | |
Cisco IOS | =15.1\(1\)sy3 | |
Cisco IOS | =15.1\(1\)sy4 | |
Cisco IOS | =15.1\(1\)sy5 | |
Cisco IOS | =15.1\(2\)sy | |
Cisco IOS | =15.1\(2\)sy1 | |
Cisco IOS | =15.1\(2\)sy2 | |
Cisco IOS | =15.1\(2\)sy3 | |
Cisco IOS | =15.1\(2\)sy4 | |
Cisco IOS | =15.1\(2\)sy4a | |
Cisco IOS | =15.1\(2\)sy5 | |
Cisco IOS | =15.1\(2\)sy6 | |
Cisco IOS | =15.2\(1\)sy | |
Cisco IOS | =15.2\(1\)sy0a | |
Cisco IOS | =15.2\(1\)sy1 | |
Cisco IOS | =15.3\(3\)jk6 | |
Cisco NX-OS | =4.1\(2\) | |
Cisco NX-OS | =4.1\(3\) | |
Cisco NX-OS | =4.1\(4\) | |
Cisco NX-OS | =4.1\(5\) | |
Cisco NX-OS | =4.2\(2a\) | |
Cisco NX-OS | =4.2\(3\) | |
Cisco NX-OS | =4.2\(4\) | |
Cisco NX-OS | =4.2\(6\) | |
Cisco NX-OS | =4.2\(8\) | |
Cisco NX-OS | =5.0\(2a\) | |
Cisco NX-OS | =5.0\(3\) | |
Cisco NX-OS | =5.0\(5\) | |
Cisco NX-OS | =5.1\(1\) | |
Cisco NX-OS | =5.1\(1a\) | |
Cisco NX-OS | =5.1\(3\) | |
Cisco NX-OS | =5.1\(4\) | |
Cisco NX-OS | =5.1\(5\) | |
Cisco NX-OS | =5.1\(6\) | |
Cisco NX-OS | =5.2\(1\) | |
Cisco NX-OS | =5.2\(3a\) | |
Cisco NX-OS | =5.2\(4\) | |
Cisco NX-OS | =5.2\(5\) | |
Cisco NX-OS | =5.2\(7\) | |
Cisco NX-OS | =5.2\(9\) | |
Cisco NX-OS | =6.0\(1\) | |
Cisco NX-OS | =6.0\(2\) | |
Cisco NX-OS | =6.0\(3\) | |
Cisco NX-OS | =6.0\(4\) | |
Cisco NX-OS | =6.1\(1\) | |
Cisco NX-OS | =6.1\(2\) | |
Cisco NX-OS | =6.1\(3\) | |
Cisco NX-OS | =6.1\(4\) | |
Cisco NX-OS | =6.1\(4a\) | |
Cisco NX-OS | =6.2\(2\) | |
Cisco NX-OS | =6.2\(2a\) | |
Cisco NX-OS | =6.2\(6\) | |
Cisco NX-OS | =6.2\(6b\) | |
Cisco NX-OS | =6.2\(8\) | |
Cisco NX-OS | =6.2\(8a\) | |
Cisco NX-OS | =6.2\(8b\) | |
Cisco NX-OS | =6.2\(10\) | |
Cisco NX-OS | =6.2\(12\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1351 has been rated as high severity due to its ability to cause denial of service through device reload.
To fix CVE-2016-1351, upgrade to a version of Cisco IOS or NX-OS that has addressed this vulnerability.
CVE-2016-1351 allows remote attackers to execute a denial of service attack by sending a crafted header in a packet.
CVE-2016-1351 affects various versions of Cisco IOS 15.1 and 15.2, as well as Cisco NX-OS versions from 4.1 to 6.2.
As of now, there are no confirmed reports of active exploitation of CVE-2016-1351 in the wild.