First published: Wed Oct 05 2016(Updated: )
Cisco IOS 12.2 and IOS XE 3.14 through 3.16 and 16.1 allow remote attackers to cause a denial of service (device reload) via crafted IP Detail Record (IPDR) packets, aka Bug ID CSCuu35089.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(33\)cx | |
Cisco IOS | =12.2\(33\)cy | |
Cisco IOS | =12.2\(33\)cy1 | |
Cisco IOS | =12.2\(33\)sch | |
Cisco IOS | =12.2\(33\)sch0a | |
Cisco IOS | =12.2\(33\)sch1 | |
Cisco IOS | =12.2\(33\)sch2 | |
Cisco IOS | =12.2\(33\)sch2a | |
Cisco IOS | =12.2\(33\)sch3 | |
Cisco IOS | =12.2\(33\)sch4 | |
Cisco IOS | =12.2\(33\)sch5 | |
Cisco IOS | =12.2\(33\)sch6 | |
Cisco IOS | =12.2\(33\)sci | |
Cisco IOS | =12.2\(33\)sci1 | |
Cisco IOS | =12.2\(33\)sci1a | |
Cisco IOS | =12.2\(33\)sci3 | |
Cisco IOS XE Software | =3.14.0s | |
Cisco IOS XE Software | =3.14.1s | |
Cisco IOS XE Software | =3.14.2s | |
Cisco IOS XE Software | =3.14.3s | |
Cisco IOS XE Software | =3.14.4s | |
Cisco IOS XE Software | =3.15.0s | |
Cisco IOS XE Software | =3.15.1cs | |
Cisco IOS XE Software | =3.15.1s | |
Cisco IOS XE Software | =3.15.2s | |
Cisco IOS XE Software | =3.15.3s | |
Cisco IOS XE Software | =3.15.4s | |
Cisco IOS XE Software | =3.16.0cs | |
Cisco IOS XE Software | =3.16.0s | |
Cisco IOS XE Software | =16.1.1 | |
Cisco IOS XE Software | =16.1.2 | |
Cisco IOS XE Software | =16.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6379 has a CVSS score that indicates a potential denial of service due to device reload vulnerabilities.
To remediate CVE-2016-6379, upgrade to the patched versions of Cisco IOS or IOS XE that address this vulnerability.
CVE-2016-6379 affects various versions of Cisco IOS and IOS XE including 12.2 and 3.14 through 3.16 and 16.1.
Exploitation of CVE-2016-6379 can lead to a denial of service condition, resulting in a device reload.
As of my last update, there is no specific evidence that CVE-2016-6379 is actively exploited in the wild, but it is critical to apply fixes.