Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2011-10-03 |
Product | Ios Xe | Last view | 2023-11-01 |
Version | 3.2.0s | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:cisco:ios_xe |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2023-11-01 | CVE-2023-20246 | Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system. |
7.2 | 2023-10-25 | CVE-2023-20273 | A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges. |
10 | 2023-10-16 | CVE-2023-20198 | Cisco is providing an update for the ongoing investigation into observed exploitation of the web UI feature in Cisco IOS XE Software. We are updating the list of fixed releases and adding the Software Checker. Our investigation has determined that the actors exploited two previously unknown issues. The attacker first exploited CVE-2023-20198 to gain initial access and issued a privilege 15 command to create a local user and password combination. This allowed the user to log in with normal user access. The attacker then exploited another component of the web UI feature, leveraging the new local user to elevate privilege to root and write the implant to the file system. Cisco has assigned CVE-2023-20273 to this issue. CVE-2023-20198 has been assigned a CVSS Score of 10.0. CVE-2023-20273 has been assigned a CVSS Score of 7.2. Both of these CVEs are being tracked by CSCwh87343. |
7.5 | 2023-10-10 | CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
8.8 | 2023-10-04 | CVE-2023-20235 | A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems. |
6.8 | 2023-03-23 | CVE-2023-20082 | A vulnerability in Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to errors that occur when retrieving the public release key that is used for image signature verification. An attacker could exploit this vulnerability by modifying specific variables in the Serial Peripheral Interface (SPI) flash memory of an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Note: In Cisco IOS XE Software releases 16.11.1 and later, the complexity of an attack using this vulnerability is high. However, an attacker with level-15 privileges could easily downgrade the Cisco IOS XE Software on a device to a release that would lower the attack complexity. |
8.8 | 2023-02-12 | CVE-2023-20076 | A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system. |
7.8 | 2021-10-21 | CVE-2021-1529 | A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges. |
6.7 | 2021-09-23 | CVE-2021-34729 | A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges on an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input in the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability. |
7.4 | 2021-09-23 | CVE-2021-34714 | A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process. |
6.5 | 2021-09-23 | CVE-2021-34703 | A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device. |
8.6 | 2021-09-23 | CVE-2021-34697 | A vulnerability in the Protection Against Distributed Denial of Service Attacks feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct denial of service (DoS) attacks to or through the affected device. This vulnerability is due to incorrect programming of the half-opened connections limit, TCP SYN flood limit, or TCP SYN cookie features when the features are configured in vulnerable releases of Cisco IOS XE Software. An attacker could exploit this vulnerability by attempting to flood traffic to or through the affected device. A successful exploit could allow the attacker to initiate a DoS attack to or through an affected device. |
5.8 | 2021-09-23 | CVE-2021-34696 | A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. |
5.8 | 2021-09-23 | CVE-2021-1625 | A vulnerability in the Zone-Based Policy Firewall feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent the Zone-Based Policy Firewall from correctly classifying traffic. This vulnerability exists because ICMP and UDP responder-to-initiator flows are not inspected when the Zone-Based Policy Firewall has either Unified Threat Defense (UTD) or Application Quality of Experience (AppQoE) configured. An attacker could exploit this vulnerability by attempting to send UDP or ICMP flows through the network. A successful exploit could allow the attacker to inject traffic through the Zone-Based Policy Firewall, resulting in traffic being dropped because it is incorrectly classified or in incorrect reporting figures being produced by high-speed logging (HSL). |
8.6 | 2021-09-23 | CVE-2021-1624 | A vulnerability in the Rate Limiting Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization in the Cisco QuantumFlow Processor of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to mishandling of the rate limiting feature within the QuantumFlow Processor. An attacker could exploit this vulnerability by sending large amounts of traffic that would be subject to NAT and rate limiting through an affected device. A successful exploit could allow the attacker to cause the QuantumFlow Processor utilization to reach 100 percent on the affected device, resulting in a DoS condition. |
7.7 | 2021-09-23 | CVE-2021-1623 | A vulnerability in the Simple Network Management Protocol (SNMP) punt handling function of Cisco cBR-8 Converged Broadband Routers could allow an authenticated, remote attacker to overload a device punt path, resulting in a denial of service (DoS) condition. This vulnerability is due to the punt path being overwhelmed by large quantities of SNMP requests. An attacker could exploit this vulnerability by sending a large number of SNMP requests to an affected device. A successful exploit could allow the attacker to overload the device punt path, resulting in a DoS condition. |
8.6 | 2021-09-23 | CVE-2021-1622 | A vulnerability in the Common Open Policy Service (COPS) of Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause resource exhaustion, resulting in a denial of service (DoS) condition. This vulnerability is due to a deadlock condition in the code when processing COPS packets under certain conditions. An attacker could exploit this vulnerability by sending COPS packets with high burst rates to an affected device. A successful exploit could allow the attacker to cause the CPU to consume excessive resources, which prevents other control plane processes from obtaining resources and results in a DoS. |
7.4 | 2021-09-23 | CVE-2021-1621 | A vulnerability in the Layer 2 punt code of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a queue wedge on an interface that receives specific Layer 2 frames, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of certain Layer 2 frames. An attacker could exploit this vulnerability by sending specific Layer 2 frames on the segment the router is connected to. A successful exploit could allow the attacker to cause a queue wedge on the interface, resulting in a DoS condition. |
4.7 | 2021-09-23 | CVE-2021-1616 | A vulnerability in the H.323 application level gateway (ALG) used by the Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass the ALG. This vulnerability is due to insufficient data validation of traffic that is traversing the ALG. An attacker could exploit this vulnerability by sending crafted traffic to a targeted device. A successful exploit could allow the attacker to bypass the ALG and open connections that should not be allowed to a remote device located behind the ALG. Note: This vulnerability has been publicly discussed as NAT Slipstreaming. |
8.6 | 2021-09-23 | CVE-2021-1611 | A vulnerability in Ethernet over GRE (EoGRE) packet processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9800 Family Wireless Controller, Embedded Wireless Controller, and Embedded Wireless on Catalyst 9000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper processing of malformed EoGRE packets. An attacker could exploit this vulnerability by sending malicious packets to the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
7.2 | 2021-03-24 | CVE-2021-1384 | A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user. This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user. |
6.7 | 2021-03-24 | CVE-2021-1382 | A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges. |
5.3 | 2021-01-13 | CVE-2021-1236 | Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. |
7.5 | 2020-11-06 | CVE-2020-3444 | A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a targeted device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network. |
8.6 | 2020-09-24 | CVE-2020-3527 | A vulnerability in the Polaris kernel of Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to crash the device. The vulnerability is due to insufficient packet size validation. An attacker could exploit this vulnerability by sending jumbo frames or frames larger than the configured MTU size to the management interface of this device. A successful exploit could allow the attacker to crash the device fully before an automatic recovery. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
29% (24) | CWE-20 | Improper Input Validation |
16% (13) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
13% (11) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9% (8) | CWE-399 | Resource Management Errors |
6% (5) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
3% (3) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (2) | CWE-667 | Insufficient Locking |
2% (2) | CWE-665 | Improper Initialization |
2% (2) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (2) | CWE-310 | Cryptographic Issues |
2% (2) | CWE-269 | Improper Privilege Management |
2% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (1) | CWE-670 | Always-Incorrect Control Flow Implementation |
1% (1) | CWE-295 | Certificate Issues |
1% (1) | CWE-287 | Improper Authentication |
1% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
1% (1) | CWE-200 | Information Exposure |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76071 | Cisco IOS Expired MPLS TTL ICMPv6 Packet Parsing Remote DoS |
76070 | Cisco IOS Expired MPLS TTL IPv6 Packet Parsing Remote DoS |
76069 | Cisco IOS IP Service Level Agreement (IP SLA) UDP Packet Parsing Remote DoS |
76009 | Cisco IOS DLSw FST IP Protocol 91 Packet Memory Leak Remote DoS |
75919 | Cisco IOS Memory Leak SIP Packet Parsing Unspecified Remote DoS |
75918 | Cisco IOS Session Control Buffers (SCB) SIP Packet Parsing Voice Service Remo... |
75917 | Cisco IOS SIP Packet Parsing Unspecified Remote DoS |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-B-0113 | Cisco NX-OS Software Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0053881 |
2014-A-0045 | Multiple Vulnerabilities in Cisco IOS Severity: Category I - VMSKEY: V0047591 |
2014-A-0046 | Multiple Vulnerabilities in Cisco IOS XE Severity: Category I - VMSKEY: V0047593 |
2013-A-0195 | Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity: Category I - VMSKEY: V0040781 |
2013-A-0185 | Multiple Vulnerabilities in Cisco IOS XE Severity: Category I - VMSKEY: V0040708 |
2013-A-0184 | Multiple Vulnerabilities in Cisco IOS Severity: Category I - VMSKEY: V0040709 |
2013-B-0086 | Cisco StarOS Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0040039 |
2013-A-0157 | Cisco ASA and Pix Firewall Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0040041 |
2013-A-0159 | Cisco IOS XE Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0040042 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-08 | Cisco IOS XE WebUI restricted character in authentication detected RuleID : 55833 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS Web UI cross site request forgery attempt RuleID : 52560 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS Web UI cross site request forgery attempt RuleID : 52559 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS DHCP relay integer underflow attempt RuleID : 46120 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS DHCP relay reply integer underflow attempt RuleID : 46119 - Type : SERVER-OTHER - Revision : 1 |
2017-09-28 | Cisco IOS IKEv2 session initialization denial of service attempt RuleID : 44464 - Type : SERVER-OTHER - Revision : 1 |
2017-08-15 | Cisco IOS DHCP denial of service attempt RuleID : 43573 - Type : SERVER-OTHER - Revision : 2 |
2017-03-23 | Cisco IOS L2TP invalid message digest AVP denial of service attempt RuleID : 42070 - Type : SERVER-OTHER - Revision : 1 |
2017-03-23 | Cisco IOS DHCP client dummy XID denial of service attempt RuleID : 42060 - Type : SERVER-OTHER - Revision : 3 |
2017-03-10 | Cisco Software Cluster Management Protocol remote code execution attempt RuleID : 41910 - Type : SERVER-OTHER - Revision : 4 |
2017-03-10 | Cisco Software Cluster Management Protocol remote code execution attempt RuleID : 41909 - Type : SERVER-OTHER - Revision : 4 |
2016-09-29 | Cisco IOS malformed H.450 PER data out of bounds read attempt RuleID : 40298 - Type : PROTOCOL-VOIP - Revision : 1 |
2016-10-10 | Cisco IOS Group-Prime SHA memory disclosure attempt RuleID : 40222-community - Type : SERVER-OTHER - Revision : 5 |
2016-09-16 | Cisco IOS Group-Prime SHA memory disclosure attempt RuleID : 40222 - Type : SERVER-OTHER - Revision : 5 |
2016-10-10 | Cisco IOS Group-Prime MD5 memory disclosure attempt RuleID : 40221-community - Type : SERVER-OTHER - Revision : 5 |
2016-09-16 | Cisco IOS Group-Prime MD5 memory disclosure attempt RuleID : 40221 - Type : SERVER-OTHER - Revision : 5 |
2016-10-10 | Cisco IOS Group-Prime memory disclosure exfiltration attempt RuleID : 40220-community - Type : SERVER-OTHER - Revision : 6 |
2016-09-16 | Cisco IOS Group-Prime memory disclosure exfiltration attempt RuleID : 40220 - Type : SERVER-OTHER - Revision : 6 |
2016-05-27 | Cisco IOS NX invalid ICMPv6 neighbor discovery hop limit denial of service at... RuleID : 39065 - Type : SERVER-OTHER - Revision : 1 |
2014-11-16 | Cisco IOS RSVP Path message with no session attribute denial of service attempt RuleID : 31980 - Type : SERVER-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-04-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-dhcpr3-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-04-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-dhcpr3-ios.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-iosxr.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-ios.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20171103-bgp-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The remote device is affected by a remote code execution vulnerability. File: cisco-sa-20170317-cmp-dos.nasl - Type: ACT_KILL_HOST |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-pnp-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-pnp-ios.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-ike-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-ike-ios.nasl - Type: ACT_GATHER_INFO |
2017-07-07 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170629-snmp-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-07-07 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170629-snmp-ios.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-dhcpc-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-dhcpc-ios.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-l2tp-ios.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-l2tp-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-03-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170317-cmp-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-03-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170317-cmp-ios.nasl - Type: ACT_GATHER_INFO |
2017-01-26 | Name: A remote device is affected by an information disclosure vulnerability. File: cisco_ikev1_info_disclosure.nasl - Type: ACT_ATTACK |
2016-09-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160916-ikev1-iosxr.nasl - Type: ACT_GATHER_INFO |
2016-09-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160916-ikev1-iosxe.nasl - Type: ACT_GATHER_INFO |
2016-09-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160916-ikev1-ios.nasl - Type: ACT_GATHER_INFO |
2016-06-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-CSCun96847-iosxe.nasl - Type: ACT_GATHER_INFO |
2016-06-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-CSCun94946-ios.nasl - Type: ACT_GATHER_INFO |