First published: Fri Jul 15 2016(Updated: )
Cisco IOS XR 5.x through 5.2.5 on NCS 6000 devices allows remote attackers to cause a denial of service (timer consumption and Route Processor reload) via crafted SSH traffic, aka Bug ID CSCux76819.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Network Convergence System 6000 | ||
Cisco IOS XRv 9000 | =5.0.0 | |
Cisco IOS XRv 9000 | =5.0.1 | |
Cisco IOS XRv 9000 | =5.0_base | |
Cisco IOS XRv 9000 | =5.1.0 | |
Cisco IOS XRv 9000 | =5.1.1 | |
Cisco IOS XRv 9000 | =5.1.1.k9sec | |
Cisco IOS XRv 9000 | =5.1.2 | |
Cisco IOS XRv 9000 | =5.1.3 | |
Cisco IOS XRv 9000 | =5.2.0 | |
Cisco IOS XRv 9000 | =5.2.1 | |
Cisco IOS XRv 9000 | =5.2.2 | |
Cisco IOS XRv 9000 | =5.2.3 | |
Cisco IOS XRv 9000 | =5.2.4 | |
Cisco IOS XRv 9000 | =5.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1426 has a critical severity level due to its potential to cause denial of service on affected Cisco devices.
To fix CVE-2016-1426, update Cisco IOS XR to version 5.2.6 or later, which addresses this vulnerability.
CVE-2016-1426 affects Cisco IOS XR versions from 5.0.0 to 5.2.5 on NCS 6000 devices.
CVE-2016-1426 involves a remote denial of service attack through crafted SSH traffic.
While CVE-2016-1426 primarily leads to denial of service, it does not directly cause data loss, but service disruption may affect data accessibility.