This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 1992-12-10
Product Ios Last view 2024-09-25
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:* 177
cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:* 176
cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:* 153
cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:* 148
cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:* 143
cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:* 142
cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:* 142
cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:* 142
cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:* 135
cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:* 134
cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:* 134
cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:* 134
cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:* 133
cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:* 133
cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:* 133
cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:* 133
cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:* 133
cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:* 132
cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:* 131
cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:* 131
cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:* 131
cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:* 131
cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:* 130
cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:* 130
cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:* 130
cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:* 130
cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:* 129
cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:* 128
cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:* 128

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.8 2024-09-25 CVE-2024-20465

A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.

This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

7.5 2024-09-25 CVE-2024-20433

A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.

This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

6.5 2024-09-25 CVE-2024-20414

A vulnerability in the web UI feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system through the web UI.

This vulnerability is due to incorrectly accepting configuration changes through the HTTP GET method. An attacker could exploit this vulnerability by persuading a currently authenticated administrator to follow a crafted link. A successful exploit could allow the attacker to change the configuration of the affected device.

9.1 2023-09-27 CVE-2023-20186

A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP).

This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device.

6.6 2023-09-27 CVE-2023-20109

A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash.

This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.

7.5 2023-03-23 CVE-2023-20080

A vulnerability in the IPv6 DHCP version 6 (DHCPv6) relay and server features of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to insufficient validation of data boundaries. An attacker could exploit this vulnerability by sending crafted DHCPv6 messages to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly.

7.7 2022-10-10 CVE-2022-20920

A vulnerability in the SSH implementation of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to improper handling of resources during an exceptional situation. An attacker could exploit this vulnerability by continuously connecting to an affected device and sending specific SSH requests. A successful exploit could allow the attacker to cause the affected device to reload.

6.5 2022-04-15 CVE-2022-20761

A vulnerability in the integrated wireless access point (AP) packet processing of the Cisco 1000 Series Connected Grid Router (CGR1K) could allow an unauthenticated, adjacent attacker to cause a denial of service condition on an affected device. This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the integrated AP to stop processing traffic, resulting in a DoS condition. It may be necessary to manually reload the CGR1K to restore AP operation.

6.7 2022-04-15 CVE-2022-20727

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

7.5 2022-04-15 CVE-2022-20726

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

4.8 2022-04-15 CVE-2022-20725

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

5.3 2022-04-15 CVE-2022-20724

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

8.6 2022-04-15 CVE-2022-20697

A vulnerability in the web services interface of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper resource management in the HTTP server code. An attacker could exploit this vulnerability by sending a large number of HTTP requests to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

6.7 2022-04-15 CVE-2022-20677

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.

4.6 2022-04-15 CVE-2022-20661

Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.

7.4 2021-09-23 CVE-2021-34714

A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process.

5.3 2021-09-23 CVE-2021-34705

A vulnerability in the Voice Telephony Service Provider (VTSP) service of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured destination patterns and dial arbitrary numbers. This vulnerability is due to insufficient validation of dial strings at Foreign Exchange Office (FXO) interfaces. An attacker could exploit this vulnerability by sending a malformed dial string to an affected device via either the ISDN protocol or SIP. A successful exploit could allow the attacker to conduct toll fraud, resulting in unexpected financial impact to affected customers.

6.5 2021-09-23 CVE-2021-34703

A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device.

7.7 2021-09-23 CVE-2021-34699

A vulnerability in the TrustSec CLI parser of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to an improper interaction between the web UI and the CLI parser. An attacker could exploit this vulnerability by requesting a particular CLI command to be run through the web UI. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

7.7 2021-09-23 CVE-2021-1620

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.

7.5 2021-03-24 CVE-2021-1460

A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.

7.8 2021-03-24 CVE-2021-1392

A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.

6.7 2021-03-24 CVE-2021-1391

A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.

6.5 2021-03-24 CVE-2021-1385

A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.

5.8 2021-03-24 CVE-2021-1377

A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets. This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
29% (116) CWE-20 Improper Input Validation
22% (89) CWE-399 Resource Management Errors
9% (37) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (17) CWE-200 Information Exposure
3% (15) CWE-264 Permissions, Privileges, and Access Controls
3% (13) CWE-287 Improper Authentication
3% (12) CWE-362 Race Condition
2% (9) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
2% (8) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (8) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (7) CWE-772 Missing Release of Resource after Effective Lifetime
1% (7) CWE-310 Cryptographic Issues
1% (6) CWE-16 Configuration
1% (5) CWE-787 Out-of-bounds Write
1% (5) CWE-352 Cross-Site Request Forgery (CSRF)
1% (4) CWE-295 Certificate Issues
0% (3) CWE-755 Improper Handling of Exceptional Conditions
0% (3) CWE-665 Improper Initialization
0% (3) CWE-284 Access Control (Authorization) Issues
0% (3) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (2) CWE-770 Allocation of Resources Without Limits or Throttling
0% (2) CWE-436 Interpretation Conflict
0% (2) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
0% (2) CWE-326 Inadequate Encryption Strength
0% (2) CWE-189 Numeric Errors

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-28 Fuzzing
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
CAPEC-66 SQL Injection
CAPEC-67 String Format Overflow in syslog()
CAPEC-71 Using Unicode Encoding to Bypass Validation Logic

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:5835 Multiple OS TCP/IP DoS Vulnerabilities
oval:org.mitre.oval:def:5727 A TCP SYN packet with target host's address as both source and destination ca...
oval:org.mitre.oval:def:5874 Cisco IOS UDP 514 Denial of Service Vulnerability
oval:org.mitre.oval:def:5575 Cisco PIX CBAC Fragmentation Attack
oval:org.mitre.oval:def:5567 Cisco IOS Remote Router Denial of Service Vulnerability
oval:org.mitre.oval:def:5827 Cisco IOS PPP CHAP Authentication Vulnerability
oval:org.mitre.oval:def:5297 Cisco IOS access-list "tacacs-ds" or "tacacs" Keyword Vulnerability
oval:org.mitre.oval:def:5661 Cisco IOS access-list Keyword Vulnerability
oval:org.mitre.oval:def:5574 Cisco IOS Input Access List Packet Leakage Flaw
oval:org.mitre.oval:def:5938 Cisco IOS HTTP Configuration Interface Denial of Service Vulnerability
oval:org.mitre.oval:def:4937 Cisco Gigabit Switch Routers (GSR) Authentication Circumvention Vulnerability
oval:org.mitre.oval:def:5918 Cisco IOS HTTP Server Query Vulnerability
oval:org.mitre.oval:def:5663 Cisco IOS HTTP Authorization Circumvention Vulnerability
oval:org.mitre.oval:def:5644 Cisco IOS BGP Denial of Service Vulnerability
oval:org.mitre.oval:def:5818 Cisco IOS Denial of Service Vulnerability
oval:org.mitre.oval:def:5892 Cisco IOS Protocol Check Design Error
oval:org.mitre.oval:def:5823 Cisco IOS CDP Denial of Service Vulnerability
oval:org.mitre.oval:def:5859 Cisco IOS Malformed PPTP Packet Denial of Service Vulnerability
oval:org.mitre.oval:def:5784 Cisco Express Forwarding Information Disclosure vulnerability
oval:org.mitre.oval:def:5449 Cisco IOS TFTP Server Long File Name Denial of Service Vulnerability
oval:org.mitre.oval:def:5803 Cisco SSH Denial of Service Vulnerability
oval:org.mitre.oval:def:5849 Multiple Vendors SSH2 "incorrect length fields" Vulnerability
oval:org.mitre.oval:def:5721 Multiple Vendors SSH2 "lists with empty elements or multiple separators" Vuln...
oval:org.mitre.oval:def:5848 Multiple Vendors SSH2 "buffer overflow" Vulnerability
oval:org.mitre.oval:def:5797 Multiple Vendors SSH2 "null characters in strings" Vulnerability

SAINT Exploits

Description Link
Cisco IOS HTTP access level authentication bypass More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
76862 Cisco Unified Communications Manager (CUCM) SIP Message Parsing Remote DoS
76818 Cisco IOS IPv6 Component Crafted Echo Request Packet Remote Information Discl...
76817 Cisco IOS cat6000-dot1x Component dot1x Infinite Loop unicast EAPoL Protocol ...
76816 Cisco IOS cat6000-dot1x Component dot1x Port Weakness Spanning Tree Protocol ...
76814 Cisco IOS ethernet-lldp Component 12 LLDP Management Address TLV Weakness LLD...
76071 Cisco IOS Expired MPLS TTL ICMPv6 Packet Parsing Remote DoS
76070 Cisco IOS Expired MPLS TTL IPv6 Packet Parsing Remote DoS
76069 Cisco IOS IP Service Level Agreement (IP SLA) UDP Packet Parsing Remote DoS
76010 Cisco IOS ICMP Packet Sequence Handling Remote DoS
76009 Cisco IOS DLSw FST IP Protocol 91 Packet Memory Leak Remote DoS
76008 Cisco IOS IPv6 Packet Handling Remote DoS
75928 Cisco IOS IPS / Zone-Based Firewall HTTP Packet Parsing Remote DoS
75927 Cisco IOS IPS / Zone-Based Firewall Leak New Session Flow Creation Memory Exh...
75925 Cisco IOS Network Address Translation UDP SIP Packet Parsing Memory Exhaustio...
75924 Cisco IOS Network Address Translation MPLS UDP SIP Packet Parsing Remote DoS
75923 Cisco IOS Network Address Translation UDP SIP Packet Parsing Remote DoS
75922 Cisco IOS Network Address Translation TCP SIP Packet Parsing Remote DoS
75921 Cisco IOS Network Address Translation H.323 Packet Parsing Remote DoS
75920 Cisco IOS Network Address Translation LDAP Packet Parsing Remote DoS
75919 Cisco IOS Memory Leak SIP Packet Parsing Unspecified Remote DoS
75918 Cisco IOS Session Control Buffers (SCB) SIP Packet Parsing Voice Service Remo...
75917 Cisco IOS SIP Packet Parsing Unspecified Remote DoS
75916 Cisco IOS Smart Install Packet Parsing Unspecified Remote Code Execution
74612 Cisco IOS Neighbor Discovery (ND) Protocol Fragmented IPv6 Packet Router Adve...
74606 Cisco IOS DLSw Narrow Timing Window Malformed Packet Remote DoS

OpenVAS Exploits

id Description
2016-05-04 Name : Cisco IOS Software and IOS XE Software LISP Denial of Service Vulnerability
File : nvt/gb_cisco_ios_Cisco-SA-20140514-CVE-2014-3262.nasl
2016-05-04 Name : Cisco IOS Software Network Address Translation Vulnerabilities
File : nvt/gb_cisco_ios_cisco-sa-20140326-nat.nasl
2016-05-04 Name : Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
File : nvt/gb_cisco_ios_cisco-sa-20140326-sip.nasl
2011-07-15 Name : ICMP Timestamp Detection
File : nvt/gb_icmp_timestamps.nasl
2009-09-10 Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-06-05 Name : Ubuntu USN-707-1 (cupsys)
File : nvt/ubuntu_707_1.nasl
2009-06-05 Name : Ubuntu USN-743-1 (gs-gpl)
File : nvt/ubuntu_743_1.nasl
2009-06-05 Name : Ubuntu USN-744-1 (lcms)
File : nvt/ubuntu_744_1.nasl
2009-01-20 Name : Ubuntu USN-708-1 (hplip)
File : nvt/ubuntu_708_1.nasl
2008-08-22 Name : Cisco IOS FTP Server Authentication Bypass Vulnerability
File : nvt/cisco_ios_ftp_server_auth_bypass.nasl
2005-11-03 Name : SSH Multiple Vulns
File : nvt/ssh_multivulns_16122002.nasl
2005-11-03 Name : TFTPD overflow
File : nvt/tftpd_overflow.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0177 Cisco IOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0061143
2015-A-0175 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0061141
2014-B-0113 Cisco NX-OS Software Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0053881
2014-A-0046 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0047593
2014-A-0045 Multiple Vulnerabilities in Cisco IOS
Severity: Category I - VMSKEY: V0047591
2014-B-0001 Cisco IOS Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0043236
2014-B-0002 Cisco IOS XE Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0043235
2013-A-0210 Cisco IOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0042299
2013-A-0195 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0040781
2013-A-0184 Multiple Vulnerabilities in Cisco IOS
Severity: Category I - VMSKEY: V0040709
2013-A-0185 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0040708
2013-A-0159 Cisco IOS XE Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040042
2013-A-0157 Cisco ASA and Pix Firewall Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040041
2013-B-0086 Cisco StarOS Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040039
2008-B-0068 Cisco 10000 uBR10012 uBR7200 Series Devices IPC Vulnerability
Severity: Category I - VMSKEY: V0017466
2008-A-0067 Cisco uBR10012 Series Devices SNMP Vulnerability
Severity: Category I - VMSKEY: V0017461
2007-T-0045 Cisco Multiple Products Extensible Authentication Protocol Denial of Service ...
Severity: Category I - VMSKEY: V0015369

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Multiple Operating Systems invalid DHCP option attempt
RuleID : 7196 - Type : OS-OTHER - Revision : 13
2020-12-08 Cisco IOS Software VLPWA file read detected
RuleID : 55808 - Type : POLICY-OTHER - Revision : 1
2020-12-05 Cisco IOS malformed SIP Via header denial of service attempt
RuleID : 54164 - Type : PROTOCOL-VOIP - Revision : 1
2020-12-05 Cisco IOS malformed SIP Via header denial of service attempt
RuleID : 54163 - Type : PROTOCOL-VOIP - Revision : 1
2020-12-05 Cisco IOS IKE2 invalid port denial of service attempt
RuleID : 54160 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS IKE2 invalid port denial of service attempt
RuleID : 54159 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOx Application Environment external VDS control message attempt
RuleID : 54155 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS EnergyWise out of bounds read attempt
RuleID : 53472 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS EnergyWise integer underflow attempt
RuleID : 53471 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS EnergyWise heap buffer overflow attempt
RuleID : 53470 - Type : SERVER-OTHER - Revision : 1
2014-01-10 same SRC/DST
RuleID : 527 - Type : BAD-TRAFFIC - Revision : 10
2020-12-05 Cisco IOS Web UI cross site request forgery attempt
RuleID : 52560 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco IOS Web UI cross site request forgery attempt
RuleID : 52559 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco IOS XE FTP Application Layer Gateway denial of service attempt
RuleID : 51646 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOx invalid TLS handshake type denial of service attempt
RuleID : 51645 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51625 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51624 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51623 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51622 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 50118 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 50117 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco IOS XE webui execPython access attempt
RuleID : 49608 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco IOS SIP calling display name denial of service attempt
RuleID : 49607 - Type : PROTOCOL-VOIP - Revision : 1
2020-12-05 Cisco IOS SIP calling display name denial of service attempt
RuleID : 49606 - Type : PROTOCOL-VOIP - Revision : 1
2018-06-05 Cisco Smart Install invalid init discovery message denial of service attempt
RuleID : 46468 - Type : SERVER-OTHER - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-cmp-ios.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-cmp-iosxe.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ospfv3-dos-ios.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ospfv3-dos-iosxe.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ptp.nasl - Type: ACT_GATHER_INFO
2018-04-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-dhcpr3-ios.nasl - Type: ACT_GATHER_INFO
2018-04-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-dhcpr3-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160928-dns-ios.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160928-dns-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-ios.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-iosxr.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-smi2-ios.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-smi2-iosxe.nasl - Type: ACT_GATHER_INFO
2018-03-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180207-iosxe.nasl - Type: ACT_GATHER_INFO
2017-11-13 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171103-bgp-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-11 Name: The remote device is affected by a remote code execution vulnerability.
File: cisco-sa-20170317-cmp-dos.nasl - Type: ACT_KILL_HOST
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-ike-ios.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-ike-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-pnp-ios.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-pnp-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-cip.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-nat.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-profinet.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-rbip-dos.nasl - Type: ACT_GATHER_INFO