ID

VAR-201603-0281


CVE

CVE-2016-1351


TITLE

Cisco IOS Software and Cisco NX-OS Software Locator/ID Separation Protocol Denial of Service Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2016-01907 // CNNVD: CNNVD-201603-357

DESCRIPTION

The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.1 and 15.2 and NX-OS 4.1 through 6.2 allows remote attackers to cause a denial of service (device reload) via a crafted header in a packet, aka Bug ID CSCuu64279. Cisco IOS and Cisco NX-OS are network operating systems that run on Cisco's switch products. A remote attacker could exploit the vulnerability by sending a malformed LISP packet to the UDP4341 port. An attacker can exploit this issue to reload the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCuu64279 and CSCuv11993. Locator/ID Separation Protocol (LISP) is one of the routing frameworks that provides new semantics for IP addresses

Trust: 2.52

sources: NVD: CVE-2016-1351 // JVNDB: JVNDB-2016-001912 // CNVD: CNVD-2016-01907 // BID: 85309 // VULHUB: VHN-90170

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01907

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy3

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(9\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(1\)sy5

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(1\)sy2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(1\)sy4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(12\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(10\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(1\)sy3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(1\)sy1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy4a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy6

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)sy0a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sy5

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(7\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)jk6

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:4.1 to 6.2

Trust: 0.8

vendor:ciscomodel:nx-os softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.1.\\\(3\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\\\(3\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\\\(2\\\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.1.\\\(5\\\)

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\\\(2\\\)sy1

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.1.\\\(4\\\)

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\\\(2\\\)sy2

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\\\(4\\\)

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\\\(1\\\)sy1

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\\\(2\\\)sy

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalystscope:eqversion:6500

Trust: 0.3

sources: CNVD: CNVD-2016-01907 // BID: 85309 // JVNDB: JVNDB-2016-001912 // CNNVD: CNNVD-201603-357 // NVD: CVE-2016-1351

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1351
value: HIGH

Trust: 1.0

NVD: CVE-2016-1351
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01907
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201603-357
value: HIGH

Trust: 0.6

VULHUB: VHN-90170
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1351
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-01907
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90170
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1351
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2016-01907 // VULHUB: VHN-90170 // JVNDB: JVNDB-2016-001912 // CNNVD: CNNVD-201603-357 // NVD: CVE-2016-1351

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-90170 // JVNDB: JVNDB-2016-001912 // NVD: CVE-2016-1351

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-357

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201603-357

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001912

PATCH

title:cisco-sa-20160323-lispurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp

Trust: 0.8

title:cisco-sa-20160323-lispurl:http://www.cisco.com/cisco/web/support/JP/113/1136/1136606_cisco-sa-20160323-lisp-j.html

Trust: 0.8

title:Cisco IOS Software and Cisco NX-OS Software Locator/ID SeparationProtocol Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/73329

Trust: 0.6

title:Cisco IOS Software and Cisco NX-OS Software Locator/ID Separation Protocol Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60682

Trust: 0.6

sources: CNVD: CNVD-2016-01907 // JVNDB: JVNDB-2016-001912 // CNNVD: CNNVD-201603-357

EXTERNAL IDS

db:NVDid:CVE-2016-1351

Trust: 3.4

db:SECTRACKid:1035383

Trust: 1.7

db:SECTRACKid:1035384

Trust: 1.7

db:JVNDBid:JVNDB-2016-001912

Trust: 0.8

db:CNNVDid:CNNVD-201603-357

Trust: 0.7

db:CNVDid:CNVD-2016-01907

Trust: 0.6

db:BIDid:85309

Trust: 0.4

db:VULHUBid:VHN-90170

Trust: 0.1

sources: CNVD: CNVD-2016-01907 // VULHUB: VHN-90170 // BID: 85309 // JVNDB: JVNDB-2016-001912 // CNNVD: CNNVD-201603-357 // NVD: CVE-2016-1351

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160323-lisp

Trust: 2.3

url:http://www.securitytracker.com/id/1035383

Trust: 1.7

url:http://www.securitytracker.com/id/1035384

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1351

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1351

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-01907 // VULHUB: VHN-90170 // BID: 85309 // JVNDB: JVNDB-2016-001912 // CNNVD: CNNVD-201603-357 // NVD: CVE-2016-1351

CREDITS

Cisco

Trust: 0.3

sources: BID: 85309

SOURCES

db:CNVDid:CNVD-2016-01907
db:VULHUBid:VHN-90170
db:BIDid:85309
db:JVNDBid:JVNDB-2016-001912
db:CNNVDid:CNNVD-201603-357
db:NVDid:CVE-2016-1351

LAST UPDATE DATE

2024-11-23T22:22:46.800000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01907date:2016-03-29T00:00:00
db:VULHUBid:VHN-90170date:2016-12-03T00:00:00
db:BIDid:85309date:2016-03-23T00:00:00
db:JVNDBid:JVNDB-2016-001912date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201603-357date:2022-07-29T00:00:00
db:NVDid:CVE-2016-1351date:2024-11-21T02:46:14.240

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01907date:2016-03-29T00:00:00
db:VULHUBid:VHN-90170date:2016-03-26T00:00:00
db:BIDid:85309date:2016-03-23T00:00:00
db:JVNDBid:JVNDB-2016-001912date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201603-357date:2016-03-24T00:00:00
db:NVDid:CVE-2016-1351date:2016-03-26T01:59:05.073