This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 1992-12-10
Product Ios Last view 2020-06-03
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:* 150
cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:* 141
cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:* 123
cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:* 119
cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:* 118
cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:* 112
cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:* 106
cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:* 101
cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:* 100
cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:* 100
cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:* 100
cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:* 100
cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:* 99
cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:* 98
cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:* 98
cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:* 98
cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:* 98

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2020-06-03 CVE-2020-3258

Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory.

8.1 2020-06-03 CVE-2020-3257

Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

7.7 2020-06-03 CVE-2020-3235

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.

8.8 2020-06-03 CVE-2020-3234

A vulnerability in the virtual console authentication of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated but low-privileged, local attacker to log in to the Virtual Device Server (VDS) of an affected device by using a set of default credentials. The vulnerability is due to the presence of weak, hard-coded credentials. An attacker could exploit this vulnerability by authenticating to the targeted device and then connecting to VDS through the device’s virtual console by using the static credentials. A successful exploit could allow the attacker to access the Linux shell of VDS as the root user.

4.7 2020-06-03 CVE-2020-3231

A vulnerability in the 802.1X feature of Cisco Catalyst 2960-L Series Switches and Cisco Catalyst CDB-8P Switches could allow an unauthenticated, adjacent attacker to forward broadcast traffic before being authenticated on the port. The vulnerability exists because broadcast traffic that is received on the 802.1X-enabled port is mishandled. An attacker could exploit this vulnerability by sending broadcast traffic on the port before being authenticated. A successful exploit could allow the attacker to send and receive broadcast traffic on the 802.1X-enabled port before authentication.

7.5 2020-06-03 CVE-2020-3230

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent IKEv2 from establishing new security associations. The vulnerability is due to incorrect handling of crafted IKEv2 SA-Init packets. An attacker could exploit this vulnerability by sending crafted IKEv2 SA-Init packets to the affected device. An exploit could allow the attacker to cause the affected device to reach the maximum incoming negotiation limits and prevent further IKEv2 security associations from being formed.

8.6 2020-06-03 CVE-2020-3228

A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

8.6 2020-06-03 CVE-2020-3226

A vulnerability in the Session Initiation Protocol (SIP) library of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on received SIP messages. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service condition.

8.6 2020-06-03 CVE-2020-3225

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

8.8 2020-06-03 CVE-2020-3217

A vulnerability in the Topology Discovery Service of Cisco One Platform Kit (onePK) in Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient length restrictions when the onePK Topology Discovery Service parses Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol message to an affected device. An exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges, or to cause a process crash, which could result in a reload of the device and cause a DoS condition.

6.7 2020-06-03 CVE-2020-3210

A vulnerability in the CLI parsers of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated, local attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The attacker must have valid user credentials at privilege level 15. The vulnerability is due to insufficient validation of arguments that are passed to specific VDS-related CLI commands. An attacker could exploit this vulnerability by authenticating to the targeted device and including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user.

6.7 2020-06-03 CVE-2020-3208

A vulnerability in the image verification feature of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) could allow an authenticated, local attacker to boot a malicious software image on an affected device. The vulnerability is due to insufficient access restrictions on the area of code that manages the image verification feature. An attacker could exploit this vulnerability by first authenticating to the targeted device and then logging in to the Virtual Device Server (VDS) of an affected device. The attacker could then, from the VDS shell, disable Cisco IOS Software integrity (image) verification. A successful exploit could allow the attacker to boot a malicious Cisco IOS Software image on the targeted device. To exploit this vulnerability, the attacker must have valid user credentials at privilege level 15.

8.8 2020-06-03 CVE-2020-3205

A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. For more information about this vulnerability, see the Details section of this advisory.

6.7 2020-06-03 CVE-2020-3204

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to cause memory corruption or execute the code with root privileges on the underlying OS of the affected device.

6 2020-06-03 CVE-2020-3201

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

7.7 2020-06-03 CVE-2020-3200

A vulnerability in the Secure Shell (SSH) server code of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. The vulnerability is due to an internal state not being represented correctly in the SSH state machine, which leads to an unexpected behavior. An attacker could exploit this vulnerability by creating an SSH connection to an affected device and using a specific traffic pattern that causes an error condition within that connection. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

8.8 2020-06-03 CVE-2020-3199

Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

9.8 2020-06-03 CVE-2020-3198

Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory.

7.5 2020-02-12 CVE-2011-4661

A memory leak vulnerability exists in Cisco IOS before 15.2(1)T due to a memory leak in the HTTP PROXY Server process (aka CSCtu52820), when configured with Cisco ISR Web Security with Cisco ScanSafe and User Authenticaiton NTLM configured.

6.8 2019-09-25 CVE-2019-12672

A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker with physical access to an affected device to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient file location validation. An attacker could exploit this vulnerability by placing code in a specific format on a USB device and inserting it into an affected Cisco device. A successful exploit could allow the attacker to execute the code with root privileges on the underlying OS of the affected device.

6.7 2019-09-25 CVE-2019-12670

A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker within the IOx Guest Shell to modify the namespace container protections on an affected device. The vulnerability is due to insufficient file permissions. An attacker could exploit this vulnerability by modifying files that they should not have access to. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container.

7.5 2019-09-25 CVE-2019-12669

A vulnerability in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec, a feature within Cisco IOS XE Software, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of a malformed packet. An attacker could exploit this vulnerability by sending a malformed packet to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.

4.8 2019-09-25 CVE-2019-12668

A vulnerability in the web framework code of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software using the banner parameter. The vulnerability is due to insufficient input validation of the banner parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by crafting a banner parameter and saving it. The attacker could then convince a user of the web interface to access a malicious link or could intercept a user request for the affected web interface and inject malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information.

7.4 2019-09-25 CVE-2019-12665

A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel.

7.5 2019-09-25 CVE-2019-12656

A vulnerability in the IOx application environment of multiple Cisco platforms could allow an unauthenticated, remote attacker to cause the IOx web server to stop processing HTTPS requests, resulting in a denial of service (DoS) condition. The vulnerability is due to a Transport Layer Security (TLS) implementation issue. An attacker could exploit this vulnerability by sending crafted TLS packets to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing HTTPS requests, resulting in a DoS condition.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
32% (126) CWE-20 Improper Input Validation
25% (99) CWE-399 Resource Management Errors
9% (39) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (17) CWE-200 Information Exposure
3% (15) CWE-264 Permissions, Privileges, and Access Controls
3% (13) CWE-287 Improper Authentication
2% (11) CWE-362 Race Condition
2% (8) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
1% (7) CWE-310 Cryptographic Issues
1% (7) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (6) CWE-772 Missing Release of Resource after Effective Lifetime
1% (6) CWE-16 Configuration
1% (5) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (4) CWE-295 Certificate Issues
1% (4) CWE-284 Access Control (Authorization) Issues
0% (2) CWE-352 Cross-Site Request Forgery (CSRF)
0% (2) CWE-326 Inadequate Encryption Strength
0% (2) CWE-269 Improper Privilege Management
0% (2) CWE-189 Numeric Errors
0% (2) CWE-123 Write-what-where Condition
0% (2) CWE-19 Data Handling
0% (1) CWE-798 Use of Hard-coded Credentials
0% (1) CWE-770 Allocation of Resources Without Limits or Throttling
0% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (1) CWE-665 Improper Initialization

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-47 Buffer Overflow via Parameter Expansion

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:5835 Multiple OS TCP/IP DoS Vulnerabilities
oval:org.mitre.oval:def:5727 A TCP SYN packet with target host's address as both source and destination ca...
oval:org.mitre.oval:def:5874 Cisco IOS UDP 514 Denial of Service Vulnerability
oval:org.mitre.oval:def:5575 Cisco PIX CBAC Fragmentation Attack
oval:org.mitre.oval:def:5567 Cisco IOS Remote Router Denial of Service Vulnerability
oval:org.mitre.oval:def:5827 Cisco IOS PPP CHAP Authentication Vulnerability
oval:org.mitre.oval:def:5297 Cisco IOS access-list "tacacs-ds" or "tacacs" Keyword Vulnerability
oval:org.mitre.oval:def:5661 Cisco IOS access-list Keyword Vulnerability
oval:org.mitre.oval:def:5574 Cisco IOS Input Access List Packet Leakage Flaw
oval:org.mitre.oval:def:5938 Cisco IOS HTTP Configuration Interface Denial of Service Vulnerability
oval:org.mitre.oval:def:4937 Cisco Gigabit Switch Routers (GSR) Authentication Circumvention Vulnerability
oval:org.mitre.oval:def:5918 Cisco IOS HTTP Server Query Vulnerability
oval:org.mitre.oval:def:5663 Cisco IOS HTTP Authorization Circumvention Vulnerability
oval:org.mitre.oval:def:5644 Cisco IOS BGP Denial of Service Vulnerability
oval:org.mitre.oval:def:5818 Cisco IOS Denial of Service Vulnerability
oval:org.mitre.oval:def:5892 Cisco IOS Protocol Check Design Error
oval:org.mitre.oval:def:5823 Cisco IOS CDP Denial of Service Vulnerability
oval:org.mitre.oval:def:5859 Cisco IOS Malformed PPTP Packet Denial of Service Vulnerability
oval:org.mitre.oval:def:5784 Cisco Express Forwarding Information Disclosure vulnerability
oval:org.mitre.oval:def:5449 Cisco IOS TFTP Server Long File Name Denial of Service Vulnerability
oval:org.mitre.oval:def:5803 Cisco SSH Denial of Service Vulnerability
oval:org.mitre.oval:def:5849 Multiple Vendors SSH2 "incorrect length fields" Vulnerability
oval:org.mitre.oval:def:5721 Multiple Vendors SSH2 "lists with empty elements or multiple separators" Vuln...
oval:org.mitre.oval:def:5848 Multiple Vendors SSH2 "buffer overflow" Vulnerability
oval:org.mitre.oval:def:5797 Multiple Vendors SSH2 "null characters in strings" Vulnerability

SAINT Exploits

Description Link
Cisco IOS HTTP access level authentication bypass More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
76862 Cisco Unified Communications Manager (CUCM) SIP Message Parsing Remote DoS
76818 Cisco IOS IPv6 Component Crafted Echo Request Packet Remote Information Discl...
76817 Cisco IOS cat6000-dot1x Component dot1x Infinite Loop unicast EAPoL Protocol ...
76816 Cisco IOS cat6000-dot1x Component dot1x Port Weakness Spanning Tree Protocol ...
76814 Cisco IOS ethernet-lldp Component 12 LLDP Management Address TLV Weakness LLD...
76071 Cisco IOS Expired MPLS TTL ICMPv6 Packet Parsing Remote DoS
76070 Cisco IOS Expired MPLS TTL IPv6 Packet Parsing Remote DoS
76069 Cisco IOS IP Service Level Agreement (IP SLA) UDP Packet Parsing Remote DoS
76010 Cisco IOS ICMP Packet Sequence Handling Remote DoS
76009 Cisco IOS DLSw FST IP Protocol 91 Packet Memory Leak Remote DoS
76008 Cisco IOS IPv6 Packet Handling Remote DoS
75928 Cisco IOS IPS / Zone-Based Firewall HTTP Packet Parsing Remote DoS
75927 Cisco IOS IPS / Zone-Based Firewall Leak New Session Flow Creation Memory Exh...
75925 Cisco IOS Network Address Translation UDP SIP Packet Parsing Memory Exhaustio...
75924 Cisco IOS Network Address Translation MPLS UDP SIP Packet Parsing Remote DoS
75923 Cisco IOS Network Address Translation UDP SIP Packet Parsing Remote DoS
75922 Cisco IOS Network Address Translation TCP SIP Packet Parsing Remote DoS
75921 Cisco IOS Network Address Translation H.323 Packet Parsing Remote DoS
75920 Cisco IOS Network Address Translation LDAP Packet Parsing Remote DoS
75919 Cisco IOS Memory Leak SIP Packet Parsing Unspecified Remote DoS
75918 Cisco IOS Session Control Buffers (SCB) SIP Packet Parsing Voice Service Remo...
75917 Cisco IOS SIP Packet Parsing Unspecified Remote DoS
75916 Cisco IOS Smart Install Packet Parsing Unspecified Remote Code Execution
74612 Cisco IOS Neighbor Discovery (ND) Protocol Fragmented IPv6 Packet Router Adve...
74606 Cisco IOS DLSw Narrow Timing Window Malformed Packet Remote DoS

OpenVAS Exploits

id Description
2016-05-04 Name : Cisco IOS Software and IOS XE Software LISP Denial of Service Vulnerability
File : nvt/gb_cisco_ios_Cisco-SA-20140514-CVE-2014-3262.nasl
2016-05-04 Name : Cisco IOS Software Network Address Translation Vulnerabilities
File : nvt/gb_cisco_ios_cisco-sa-20140326-nat.nasl
2016-05-04 Name : Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
File : nvt/gb_cisco_ios_cisco-sa-20140326-sip.nasl
2011-07-15 Name : ICMP Timestamp Detection
File : nvt/gb_icmp_timestamps.nasl
2009-09-10 Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-06-05 Name : Ubuntu USN-707-1 (cupsys)
File : nvt/ubuntu_707_1.nasl
2009-06-05 Name : Ubuntu USN-743-1 (gs-gpl)
File : nvt/ubuntu_743_1.nasl
2009-06-05 Name : Ubuntu USN-744-1 (lcms)
File : nvt/ubuntu_744_1.nasl
2009-01-20 Name : Ubuntu USN-708-1 (hplip)
File : nvt/ubuntu_708_1.nasl
2008-08-22 Name : Cisco IOS FTP Server Authentication Bypass Vulnerability
File : nvt/cisco_ios_ftp_server_auth_bypass.nasl
2005-11-03 Name : SSH Multiple Vulns
File : nvt/ssh_multivulns_16122002.nasl
2005-11-03 Name : TFTPD overflow
File : nvt/tftpd_overflow.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0175 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0061141
2015-A-0177 Cisco IOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0061143
2014-B-0113 Cisco NX-OS Software Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0053881
2014-A-0045 Multiple Vulnerabilities in Cisco IOS
Severity: Category I - VMSKEY: V0047591
2014-A-0046 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0047593
2014-B-0002 Cisco IOS XE Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0043235
2014-B-0001 Cisco IOS Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0043236
2013-A-0210 Cisco IOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0042299
2013-A-0195 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0040781
2013-A-0185 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0040708
2013-A-0184 Multiple Vulnerabilities in Cisco IOS
Severity: Category I - VMSKEY: V0040709
2013-B-0086 Cisco StarOS Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040039
2013-A-0157 Cisco ASA and Pix Firewall Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040041
2013-A-0159 Cisco IOS XE Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040042
2007-T-0045 Cisco Multiple Products Extensible Authentication Protocol Denial of Service ...
Severity: Category I - VMSKEY: V0015369

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 multiple operating systems DHCP option overflow attempt
RuleID : 7196 - Type : OS-OTHER - Revision : 12
2014-01-10 same SRC/DST
RuleID : 527 - Type : BAD-TRAFFIC - Revision : 10
2018-06-05 Cisco Smart Install invalid init discovery message denial of service attempt
RuleID : 46468 - Type : SERVER-OTHER - Revision : 1
2018-05-01 Cisco Smart Install init discovery message stack buffer overflow attempt
RuleID : 46096 - Type : SERVER-OTHER - Revision : 2
2017-09-28 Cisco IOS IKEv2 session initialization denial of service attempt
RuleID : 44464 - Type : SERVER-OTHER - Revision : 1
2017-09-28 Cisco IE2000 CIP forward open packet processing null pointer dereference attempt
RuleID : 44459 - Type : PROTOCOL-SCADA - Revision : 1
2017-09-28 Cisco IE2000 CIP get attributes all packet processing memory leak attempt
RuleID : 44458 - Type : PROTOCOL-SCADA - Revision : 1
2017-09-21 Cisco IOS ipnat_dns_shift_data integer underflow attempt
RuleID : 44379 - Type : PROTOCOL-DNS - Revision : 1
2017-08-15 Cisco IOS DHCP denial of service attempt
RuleID : 43573 - Type : SERVER-OTHER - Revision : 2
2017-08-10 Cisco IOS authentication proxy authentication request attempt
RuleID : 43514 - Type : SERVER-OTHER - Revision : 2
2017-03-23 Cisco IOS L2TP invalid message digest AVP denial of service attempt
RuleID : 42070 - Type : SERVER-OTHER - Revision : 1
2017-03-23 Cisco IOS DHCP client dummy XID denial of service attempt
RuleID : 42060 - Type : SERVER-OTHER - Revision : 3
2017-03-23 Cisco IOS autonomic networking discovery denial of service attempt
RuleID : 42051 - Type : SERVER-OTHER - Revision : 1
2017-03-10 Cisco Software Cluster Management Protocol remote code execution attempt
RuleID : 41910 - Type : SERVER-OTHER - Revision : 3
2017-03-10 Cisco Software Cluster Management Protocol remote code execution attempt
RuleID : 41909 - Type : SERVER-OTHER - Revision : 3
2017-02-27 Cisco IOS Smart Install protocol version command attempt
RuleID : 41725-community - Type : SERVER-OTHER - Revision : 4
2017-03-28 Cisco IOS Smart Install protocol version command attempt
RuleID : 41725 - Type : SERVER-OTHER - Revision : 4
2016-09-29 Cisco IOS CIP request parser out of bounds array access attempt
RuleID : 40304 - Type : PROTOCOL-SCADA - Revision : 1
2016-09-29 Cisco IOS CIP request parser out of bounds array access attempt
RuleID : 40303 - Type : PROTOCOL-SCADA - Revision : 1
2016-09-29 Cisco IOS malformed H.450 PER data out of bounds read attempt
RuleID : 40298 - Type : PROTOCOL-VOIP - Revision : 1
2016-10-10 Cisco IOS Group-Prime SHA memory disclosure attempt
RuleID : 40222-community - Type : SERVER-OTHER - Revision : 5
2016-09-16 Cisco IOS Group-Prime SHA memory disclosure attempt
RuleID : 40222 - Type : SERVER-OTHER - Revision : 5
2016-10-10 Cisco IOS Group-Prime MD5 memory disclosure attempt
RuleID : 40221-community - Type : SERVER-OTHER - Revision : 5
2016-09-16 Cisco IOS Group-Prime MD5 memory disclosure attempt
RuleID : 40221 - Type : SERVER-OTHER - Revision : 5
2016-10-10 Cisco IOS Group-Prime memory disclosure exfiltration attempt
RuleID : 40220-community - Type : SERVER-OTHER - Revision : 6

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-cmp-ios.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-cmp-iosxe.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ospfv3-dos-ios.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ospfv3-dos-iosxe.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ptp.nasl - Type: ACT_GATHER_INFO
2018-04-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-dhcpr3-ios.nasl - Type: ACT_GATHER_INFO
2018-04-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-dhcpr3-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160928-dns-ios.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160928-dns-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-ios.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-iosxr.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-smi2-ios.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-smi2-iosxe.nasl - Type: ACT_GATHER_INFO
2018-03-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180207-iosxe.nasl - Type: ACT_GATHER_INFO
2017-11-13 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171103-bgp-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-11 Name: The remote device is affected by a remote code execution vulnerability.
File: cisco-sa-20170317-cmp-dos.nasl - Type: ACT_KILL_HOST
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-ike-ios.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-ike-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-pnp-ios.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-pnp-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-cip.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-nat.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-profinet.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-rbip-dos.nasl - Type: ACT_GATHER_INFO