ID

VAR-201603-0292


CVE

CVE-2016-1344


TITLE

Cisco IOS and IOS XE of IKEv2 Denial of service in implementation (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-001908

DESCRIPTION

The IKEv2 implementation in Cisco IOS 15.0 through 15.6 and IOS XE 3.3 through 3.17 allows remote attackers to cause a denial of service (device reload) via fragmented packets, aka Bug ID CSCux38417. Both Cisco IOS and IOSXESoftware are operating systems developed by Cisco for its network devices. A security vulnerability exists in the fragmentation code for the IKE2 version in CiscoIOS and IOSXESoftware because the program failed to properly handle fragmented IKEv2 packets. A remote attacker could exploit the vulnerability by sending a specially crafted UDP packet to cause a denial of service. This issue is being tracked by Cisco Bug ID CSCux38417. Note: The traffic only to the directed system can be exploited by this issue. The vulnerability can be triggered by IPv4 and IPv6 traffic

Trust: 2.52

sources: NVD: CVE-2016-1344 // JVNDB: JVNDB-2016-001908 // CNVD: CNVD-2016-01920 // BID: 85311 // VULHUB: VHN-90163

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01920

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_3.6.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s_3.3.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_3.6.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s_3.3.1s

Trust: 1.0

vendor:samsungmodel:x14jscope:eqversion:t-ms14jakucb-1102.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_3.8.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo_3.3.1xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.6sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_3.8.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sg_3.3.2sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_3.8.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.2ae

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17s_3.17.0s

Trust: 1.0

vendor:zzincmodel:keymousescope:eqversion:3.08

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sg_3.3.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.1xbs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.2sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3sg_3.3.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.4as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_3.6.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.3sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.1s

Trust: 1.0

vendor:zyxelmodel:gs1900-10hpscope:ltversion:2.50\(aazi.0\)c0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.0cs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.1cs

Trust: 1.0

vendor:netgearmodel:jr6150scope:ltversion:2017-01-06

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo_3.3.0xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.2ts

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.5sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.2e

Trust: 1.0

vendor:lenovomodel:thinkcentre e75sscope:ltversion:m16kt61a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.2as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s_3.3.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8e_3.8.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.7sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8e_3.8.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_3.5.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4sg_3.4.4sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.7s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo_3.3.2xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.1s

Trust: 1.0

vendor:sunmodel:opensolarisscope:eqversion:snv_124

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.6

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3 to 3.17

Trust: 0.8

vendor:ciscomodel:iosscope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\\\(2\\\)sg6

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.5\\\(1\\\)s1

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(2a\\\)e1

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(4\\\)m6a

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(1\\\)sy1

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(2\\\)e2

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.4\\\(3\\\)s3

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.5\\\(1\\\)t1

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(4\\\)gc

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.4\\\(1\\\)t4

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2016-01920 // BID: 85311 // JVNDB: JVNDB-2016-001908 // CNNVD: CNNVD-201603-354 // NVD: CVE-2016-1344

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1344
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-1344
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01920
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201603-354
value: HIGH

Trust: 0.6

VULHUB: VHN-90163
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1344
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-01920
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90163
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1344
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01920 // VULHUB: VHN-90163 // JVNDB: JVNDB-2016-001908 // CNNVD: CNNVD-201603-354 // NVD: CVE-2016-1344

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-90163 // JVNDB: JVNDB-2016-001908 // NVD: CVE-2016-1344

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-354

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201603-354

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001908

PATCH

title:cisco-sa-20160323-ios-ikev2url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2

Trust: 0.8

title:cisco-sa-20160323-ios-ikev2url:http://www.cisco.com/cisco/web/support/JP/113/1136/1136604_cisco-sa-20160323-ios-ikev2-j.html

Trust: 0.8

title:Patch for CiscoIOS and IOSXESoftwareInternetKeyExchange Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/73328

Trust: 0.6

title:Cisco IOS and IOS XE Software IKEv2 Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60679

Trust: 0.6

sources: CNVD: CNVD-2016-01920 // JVNDB: JVNDB-2016-001908 // CNNVD: CNNVD-201603-354

EXTERNAL IDS

db:NVDid:CVE-2016-1344

Trust: 3.4

db:BIDid:85311

Trust: 1.4

db:SECTRACKid:1035382

Trust: 1.1

db:JVNDBid:JVNDB-2016-001908

Trust: 0.8

db:CNNVDid:CNNVD-201603-354

Trust: 0.7

db:CNVDid:CNVD-2016-01920

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-90163

Trust: 0.1

sources: CNVD: CNVD-2016-01920 // VULHUB: VHN-90163 // BID: 85311 // JVNDB: JVNDB-2016-001908 // CNNVD: CNNVD-201603-354 // NVD: CVE-2016-1344

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160323-ios-ikev2

Trust: 2.6

url:http://www.securityfocus.com/bid/85311

Trust: 1.1

url:http://www.securitytracker.com/id/1035382

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1344

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1344

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2016-01920 // VULHUB: VHN-90163 // BID: 85311 // JVNDB: JVNDB-2016-001908 // CNNVD: CNNVD-201603-354 // NVD: CVE-2016-1344

CREDITS

Cisco

Trust: 0.3

sources: BID: 85311

SOURCES

db:CNVDid:CNVD-2016-01920
db:VULHUBid:VHN-90163
db:BIDid:85311
db:JVNDBid:JVNDB-2016-001908
db:CNNVDid:CNNVD-201603-354
db:NVDid:CVE-2016-1344

LAST UPDATE DATE

2024-11-23T20:15:08.632000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01920date:2016-03-30T00:00:00
db:VULHUBid:VHN-90163date:2017-05-12T00:00:00
db:BIDid:85311date:2017-05-23T16:23:00
db:JVNDBid:JVNDB-2016-001908date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201603-354date:2016-03-28T00:00:00
db:NVDid:CVE-2016-1344date:2024-11-21T02:46:13.400

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01920date:2016-03-30T00:00:00
db:VULHUBid:VHN-90163date:2016-03-26T00:00:00
db:BIDid:85311date:2016-03-23T00:00:00
db:JVNDBid:JVNDB-2016-001908date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201603-354date:2016-03-24T00:00:00
db:NVDid:CVE-2016-1344date:2016-03-26T01:59:01.247