ID

VAR-201603-0295


CVE

CVE-2016-1348


TITLE

Cisco IOS and IOS XE Software DHCPv6 Relay Denial of Service Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2016-01906 // CNNVD: CNNVD-201603-358

DESCRIPTION

Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821. Both Cisco IOS and IOSXESoftware are operating systems developed by Cisco for its network devices. Successful exploits may allow attackers to cause the device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCus55821

Trust: 2.61

sources: NVD: CVE-2016-1348 // JVNDB: JVNDB-2016-001909 // CNVD: CNVD-2016-01906 // BID: 85310 // VULHUB: VHN-90167 // VULMON: CVE-2016-1348

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01906

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.2e

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.2as

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.4s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.1xbs

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.4s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.1as

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_3.6.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_3.6.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.0s

Trust: 1.0

vendor:samsungmodel:x14jscope:eqversion:t-ms14jakucb-1102.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7e_3.7.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_3.8.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo_3.3.1xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_3.8.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s_3.8.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.2ae

Trust: 1.0

vendor:zzincmodel:keymousescope:eqversion:3.08

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14s_3.14.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12s_3.12.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.4as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s_3.6.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.1s

Trust: 1.0

vendor:zyxelmodel:gs1900-10hpscope:ltversion:2.50\(aazi.0\)c0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16s_3.16.0cs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15s_3.15.1cs

Trust: 1.0

vendor:netgearmodel:jr6150scope:ltversion:2017-01-06

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo_3.3.0xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.2ts

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9s_3.9.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8e_3.8.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_3.5.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5e_3.5.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.7s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11s_3.11.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10s_3.10.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3xo_3.3.2xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6e_3.6.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s_3.7.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s_3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13s_3.13.1s

Trust: 1.0

vendor:sunmodel:opensolarisscope:eqversion:snv_124

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.5

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.3 to 3.16

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0-15.5

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.3-3.16

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.1\\\(1\\\)sy5

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(1\\\)s2

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\\\(3\\\)ea

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-01906 // BID: 85310 // JVNDB: JVNDB-2016-001909 // CNNVD: CNNVD-201603-358 // NVD: CVE-2016-1348

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1348
value: HIGH

Trust: 1.0

NVD: CVE-2016-1348
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01906
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201603-358
value: HIGH

Trust: 0.6

VULHUB: VHN-90167
value: HIGH

Trust: 0.1

VULMON: CVE-2016-1348
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1348
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-01906
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90167
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1348
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01906 // VULHUB: VHN-90167 // VULMON: CVE-2016-1348 // JVNDB: JVNDB-2016-001909 // CNNVD: CNNVD-201603-358 // NVD: CVE-2016-1348

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-90167 // JVNDB: JVNDB-2016-001909 // NVD: CVE-2016-1348

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-358

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201603-358

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001909

PATCH

title:cisco-sa-20160323-dhcpv6url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6

Trust: 0.8

title:cisco-sa-20160323-dhcpv6url:http://www.cisco.com/cisco/web/support/JP/113/1136/1136605_cisco-sa-20160323-dhcpv6-j.html

Trust: 0.8

title:Patch for CiscoIOS and IOSXESoftwareDHCPv6relay Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/73326

Trust: 0.6

title:Cisco IOS and IOS XE Software DHCPv6 Relay Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60683

Trust: 0.6

title:Cisco: Cisco IOS and IOS XE Software DHCPv6 Relay Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160323-dhcpv6

Trust: 0.1

sources: CNVD: CNVD-2016-01906 // VULMON: CVE-2016-1348 // JVNDB: JVNDB-2016-001909 // CNNVD: CNNVD-201603-358

EXTERNAL IDS

db:NVDid:CVE-2016-1348

Trust: 3.5

db:SECTRACKid:1035381

Trust: 1.2

db:JVNDBid:JVNDB-2016-001909

Trust: 0.8

db:CNNVDid:CNNVD-201603-358

Trust: 0.7

db:CNVDid:CNVD-2016-01906

Trust: 0.6

db:BIDid:85310

Trust: 0.5

db:VULHUBid:VHN-90167

Trust: 0.1

db:VULMONid:CVE-2016-1348

Trust: 0.1

sources: CNVD: CNVD-2016-01906 // VULHUB: VHN-90167 // VULMON: CVE-2016-1348 // BID: 85310 // JVNDB: JVNDB-2016-001909 // CNNVD: CNNVD-201603-358 // NVD: CVE-2016-1348

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160323-dhcpv6

Trust: 2.5

url:http://www.securitytracker.com/id/1035381

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1348

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1348

Trust: 0.8

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:www.cisco.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/85310

Trust: 0.1

sources: CNVD: CNVD-2016-01906 // VULHUB: VHN-90167 // VULMON: CVE-2016-1348 // BID: 85310 // JVNDB: JVNDB-2016-001909 // CNNVD: CNNVD-201603-358 // NVD: CVE-2016-1348

CREDITS

Cisco

Trust: 0.3

sources: BID: 85310

SOURCES

db:CNVDid:CNVD-2016-01906
db:VULHUBid:VHN-90167
db:VULMONid:CVE-2016-1348
db:BIDid:85310
db:JVNDBid:JVNDB-2016-001909
db:CNNVDid:CNNVD-201603-358
db:NVDid:CVE-2016-1348

LAST UPDATE DATE

2024-11-23T22:13:19.959000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01906date:2016-03-28T00:00:00
db:VULHUBid:VHN-90167date:2016-12-03T00:00:00
db:VULMONid:CVE-2016-1348date:2016-12-03T00:00:00
db:BIDid:85310date:2016-03-23T00:00:00
db:JVNDBid:JVNDB-2016-001909date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201603-358date:2016-03-28T00:00:00
db:NVDid:CVE-2016-1348date:2024-11-21T02:46:13.897

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01906date:2016-03-29T00:00:00
db:VULHUBid:VHN-90167date:2016-03-26T00:00:00
db:VULMONid:CVE-2016-1348date:2016-03-26T00:00:00
db:BIDid:85310date:2016-03-23T00:00:00
db:JVNDBid:JVNDB-2016-001909date:2016-03-29T00:00:00
db:CNNVDid:CNNVD-201603-358date:2016-03-24T00:00:00
db:NVDid:CVE-2016-1348date:2016-03-26T01:59:02.200