7.8
CWE
399
Advisory Published
Updated

CVE-2016-6391

First published: Wed Oct 05 2016(Updated: )

Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco IOS=12.2\(44\)ex
Cisco IOS=12.2\(44\)ex1
Cisco IOS=12.2\(46\)se
Cisco IOS=12.2\(46\)se1
Cisco IOS=12.2\(46\)se2
Cisco IOS=12.2\(50\)se
Cisco IOS=12.2\(50\)se1
Cisco IOS=12.2\(50\)se2
Cisco IOS=12.2\(50\)se3
Cisco IOS=12.2\(50\)se4
Cisco IOS=12.2\(50\)se5
Cisco IOS=12.2\(52\)se
Cisco IOS=12.2\(52\)se1
Cisco IOS=12.2\(55\)se
Cisco IOS=12.2\(55\)se3
Cisco IOS=12.2\(55\)se4
Cisco IOS=12.2\(55\)se5
Cisco IOS=12.2\(55\)se6
Cisco IOS=12.2\(55\)se7
Cisco IOS=12.2\(55\)se8
Cisco IOS=12.2\(55\)se9
Cisco IOS=12.2\(55\)se10
Cisco IOS=12.2\(58\)se2
Cisco IOS=15.0\(1\)ey
Cisco IOS=15.0\(1\)ey1
Cisco IOS=15.0\(1\)ey2
Cisco IOS=15.0\(2\)eb
Cisco IOS=15.0\(2\)ey
Cisco IOS=15.0\(2\)ey1
Cisco IOS=15.0\(2\)ey2
Cisco IOS=15.0\(2\)ey3
Cisco IOS=15.0\(2\)se
Cisco IOS=15.0\(2\)se1
Cisco IOS=15.0\(2\)se2
Cisco IOS=15.0\(2\)se3
Cisco IOS=15.0\(2\)se4
Cisco IOS=15.0\(2\)se5
Cisco IOS=15.0\(2\)se6
Cisco IOS=15.0\(2\)se7
Cisco IOS=15.0\(2\)se9
Cisco IOS=15.2\(1\)ey
Cisco IOS=15.2\(2\)e
Cisco IOS=15.2\(2\)e1
Cisco IOS=15.2\(2\)e2
Cisco IOS=15.2\(2\)e4
Cisco IOS=15.2\(3\)ea
Cisco IOS=15.3\(3\)ja
Cisco IOS=15.3\(3\)ja1
Cisco IOS=15.3\(3\)ja1m
Cisco IOS=15.3\(3\)ja1n
Cisco IOS=15.3\(3\)ja4
Cisco IOS=15.3\(3\)ja5
Cisco IOS=15.3\(3\)ja7
Cisco IOS=15.3\(3\)ja8
Cisco IOS=15.3\(3\)ja9
Cisco IOS=15.3\(3\)ja77
Cisco IOS=15.3\(3\)jaa
Cisco IOS=15.3\(3\)jab
Cisco IOS=15.3\(3\)jax
Cisco IOS=15.3\(3\)jax1
Cisco IOS=15.3\(3\)jax2
Cisco IOS=15.3\(3\)jb
Cisco IOS=15.3\(3\)jb75
Cisco IOS=15.3\(3\)jbb
Cisco IOS=15.3\(3\)jbb1
Cisco IOS=15.3\(3\)jbb2
Cisco IOS=15.3\(3\)jbb4
Cisco IOS=15.3\(3\)jbb5
Cisco IOS=15.3\(3\)jbb6
Cisco IOS=15.3\(3\)jbb6a
Cisco IOS=15.3\(3\)jbb8
Cisco IOS=15.3\(3\)jbb50
Cisco IOS=15.3\(3\)jc
Cisco IOS=15.3\(3\)jn3
Cisco IOS=15.3\(3\)jn4
Cisco IOS=15.3\(3\)jn7
Cisco IOS=15.3\(3\)jn8
Cisco IOS=15.3\(3\)jnb
Cisco IOS=15.3\(3\)jnb1
Cisco IOS=15.3\(3\)jnb2
Cisco IOS=15.3\(3\)jnb3
Cisco IOS=15.3\(3\)jnc
Cisco IOS=15.3\(3\)jnc1
Cisco IOS=15.3\(3\)jnp
Cisco IOS=15.3\(3\)jnp1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-6391?

    CVE-2016-6391 is classified as a denial of service vulnerability.

  • How do I fix CVE-2016-6391?

    To fix CVE-2016-6391, you should upgrade to a fixed version of Cisco IOS as provided in the security advisory.

  • Who is affected by CVE-2016-6391?

    CVE-2016-6391 affects Cisco IOS versions 12.2 through 15.3.

  • What type of attack does CVE-2016-6391 involve?

    CVE-2016-6391 involves a crafted series of Common Industrial Protocol (CIP) requests that can cause a traffic-processing outage.

  • When was CVE-2016-6391 discovered?

    CVE-2016-6391 was disclosed on September 28, 2016.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203