First published: Thu Nov 03 2016(Updated: )
A vulnerability in the Transaction Language 1 (TL1) code of Cisco ASR 900 Series routers could allow an unauthenticated, remote attacker to cause a reload of, or remotely execute code on, the affected system. This vulnerability affects Cisco ASR 900 Series Aggregation Services Routers (ASR902, ASR903, and ASR907) that are running the following releases of Cisco IOS XE Software: 3.17.0S 3.17.1S 3.17.2S 3.18.0S 3.18.1S. More Information: CSCuy15175. Known Affected Releases: 15.6(1)S 15.6(2)S. Known Fixed Releases: 15.6(1)S2.12 15.6(1.17)S0.41 15.6(1.17)SP 15.6(2)SP 16.4(0.183) 16.5(0.10).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =3.17.0s | |
Cisco IOS XE Web UI | =3.17.1s | |
Cisco IOS XE Web UI | =3.17.2s | |
Cisco IOS XE Web UI | =3.17s | |
Cisco IOS XE Web UI | =3.18.0s | |
Cisco IOS XE Web UI | =3.18.1s | |
Cisco IOS XE Web UI | =3.18s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6441 is rated as critical due to its potential to allow unauthorized remote code execution.
To mitigate CVE-2016-6441, ensure you update to a fixed version of the Cisco IOS XE software.
CVE-2016-6441 affects Cisco ASR 900 Series Aggregation Services Routers including models ASR902 and ASR903.
Yes, CVE-2016-6441 can be exploited by an unauthenticated remote attacker.
Exploiting CVE-2016-6441 may lead to a system reload or remote code execution, compromising network integrity.