First published: Wed Oct 05 2016(Updated: )
Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(44\)ex | |
Cisco IOS | =12.2\(44\)ex1 | |
Cisco IOS | =12.2\(46\)se | |
Cisco IOS | =12.2\(46\)se1 | |
Cisco IOS | =12.2\(46\)se2 | |
Cisco IOS | =12.2\(50\)se | |
Cisco IOS | =12.2\(50\)se1 | |
Cisco IOS | =12.2\(50\)se2 | |
Cisco IOS | =12.2\(50\)se3 | |
Cisco IOS | =12.2\(50\)se4 | |
Cisco IOS | =12.2\(50\)se5 | |
Cisco IOS | =12.2\(52\)se | |
Cisco IOS | =12.2\(52\)se1 | |
Cisco IOS | =12.2\(55\)se | |
Cisco IOS | =12.2\(55\)se3 | |
Cisco IOS | =12.2\(55\)se4 | |
Cisco IOS | =12.2\(55\)se5 | |
Cisco IOS | =12.2\(55\)se6 | |
Cisco IOS | =12.2\(55\)se7 | |
Cisco IOS | =12.2\(55\)se8 | |
Cisco IOS | =12.2\(55\)se9 | |
Cisco IOS | =12.2\(55\)se10 | |
Cisco IOS | =12.2\(58\)se2 | |
Cisco IOS | =15.0\(1\)ey | |
Cisco IOS | =15.0\(1\)ey1 | |
Cisco IOS | =15.0\(1\)ey2 | |
Cisco IOS | =15.0\(2\)eb | |
Cisco IOS | =15.0\(2\)ey | |
Cisco IOS | =15.0\(2\)ey1 | |
Cisco IOS | =15.0\(2\)ey2 | |
Cisco IOS | =15.0\(2\)ey3 | |
Cisco IOS | =15.0\(2\)se | |
Cisco IOS | =15.0\(2\)se1 | |
Cisco IOS | =15.0\(2\)se2 | |
Cisco IOS | =15.0\(2\)se3 | |
Cisco IOS | =15.0\(2\)se4 | |
Cisco IOS | =15.0\(2\)se5 | |
Cisco IOS | =15.0\(2\)se6 | |
Cisco IOS | =15.0\(2\)se7 | |
Cisco IOS | =15.0\(2\)se9 | |
Cisco IOS | =15.2\(1\)ey | |
Cisco IOS | =15.2\(2\)e | |
Cisco IOS | =15.2\(2\)e1 | |
Cisco IOS | =15.2\(2\)e2 | |
Cisco IOS | =15.2\(2\)e4 | |
Cisco IOS | =15.2\(3\)ea | |
Cisco IOS | =15.3\(3\)ja | |
Cisco IOS | =15.3\(3\)ja1 | |
Cisco IOS | =15.3\(3\)ja1m | |
Cisco IOS | =15.3\(3\)ja1n | |
Cisco IOS | =15.3\(3\)ja4 | |
Cisco IOS | =15.3\(3\)ja5 | |
Cisco IOS | =15.3\(3\)ja7 | |
Cisco IOS | =15.3\(3\)ja8 | |
Cisco IOS | =15.3\(3\)ja9 | |
Cisco IOS | =15.3\(3\)ja77 | |
Cisco IOS | =15.3\(3\)jaa | |
Cisco IOS | =15.3\(3\)jab | |
Cisco IOS | =15.3\(3\)jax | |
Cisco IOS | =15.3\(3\)jax1 | |
Cisco IOS | =15.3\(3\)jax2 | |
Cisco IOS | =15.3\(3\)jb | |
Cisco IOS | =15.3\(3\)jb75 | |
Cisco IOS | =15.3\(3\)jbb | |
Cisco IOS | =15.3\(3\)jbb1 | |
Cisco IOS | =15.3\(3\)jbb2 | |
Cisco IOS | =15.3\(3\)jbb4 | |
Cisco IOS | =15.3\(3\)jbb5 | |
Cisco IOS | =15.3\(3\)jbb6 | |
Cisco IOS | =15.3\(3\)jbb6a | |
Cisco IOS | =15.3\(3\)jbb8 | |
Cisco IOS | =15.3\(3\)jbb50 | |
Cisco IOS | =15.3\(3\)jc | |
Cisco IOS | =15.3\(3\)jn3 | |
Cisco IOS | =15.3\(3\)jn4 | |
Cisco IOS | =15.3\(3\)jn7 | |
Cisco IOS | =15.3\(3\)jn8 | |
Cisco IOS | =15.3\(3\)jnb | |
Cisco IOS | =15.3\(3\)jnb1 | |
Cisco IOS | =15.3\(3\)jnb2 | |
Cisco IOS | =15.3\(3\)jnb3 | |
Cisco IOS | =15.3\(3\)jnc | |
Cisco IOS | =15.3\(3\)jnc1 | |
Cisco IOS | =15.3\(3\)jnp | |
Cisco IOS | =15.3\(3\)jnp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6391 is classified as a denial of service vulnerability.
To fix CVE-2016-6391, you should upgrade to a fixed version of Cisco IOS as provided in the security advisory.
CVE-2016-6391 affects Cisco IOS versions 12.2 through 15.3.
CVE-2016-6391 involves a crafted series of Common Industrial Protocol (CIP) requests that can cause a traffic-processing outage.
CVE-2016-6391 was disclosed on September 28, 2016.