7.5
CWE
399
Advisory Published
Updated

CVE-2016-1399

First published: Sat May 14 2016(Updated: )

The packet-processing microcode in Cisco IOS 15.2(2)EA, 15.2(2)EA1, 15.2(2)EA2, and 15.2(4)EA on Industrial Ethernet 4000 devices and 15.2(2)EB and 15.2(2)EB1 on Industrial Ethernet 5000 devices allows remote attackers to cause a denial of service (packet data corruption) via crafted IPv4 ICMP packets, aka Bug ID CSCuy13431.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Puppet Cisco IOS=15.2\(2\)eb
Puppet Cisco IOS=15.2\(2\)eb1
Cisco IE 5000-12S12P-10G Industrial Ethernet Switch
Cisco IE 5000-16S12P
Puppet Cisco IOS=15.2\(2\)ea2
Puppet Cisco IOS=15.2\(4\)ea
Puppet Cisco IOS=15.2\(2\)ea
Puppet Cisco IOS=15.2\(2\)ea1
Cisco IE 4000 Series
Cisco IE 4000 Series Switch
Cisco IE 4000 Series Switches
Cisco IE 4000 Series Switches
Cisco IE 4000 Series Industrial Ethernet Switches
Cisco IE 4000 Series Switches
Cisco IE 4000 Series Switches
Cisco IE-4000 Series Switches
Cisco IE-4000 Series
Cisco IE 4000 Series Switch
Cisco IE-4000 Series Switch
Cisco IE 4000 Series Switch

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-1399?

    CVE-2016-1399 has a Medium severity level, indicating potential impact on network availability.

  • How do I fix CVE-2016-1399?

    To fix CVE-2016-1399, upgrade to a non-vulnerable version of Cisco IOS.

  • What type of devices are affected by CVE-2016-1399?

    CVE-2016-1399 affects Cisco Industrial Ethernet 4000 and 5000 devices running specific versions of Cisco IOS.

  • What vulnerability does CVE-2016-1399 exploit?

    CVE-2016-1399 exploits a flaw in the packet-processing microcode which can lead to denial of service due to packet data corruption.

  • Can CVE-2016-1399 be exploited remotely?

    Yes, CVE-2016-1399 can be exploited remotely by sending crafted IPv4 ICMP packets.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203