Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 1992-12-10 |
Product | Ios | Last view | 2024-09-25 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.8 | 2024-09-25 | CVE-2024-20465 | A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. |
7.5 | 2024-09-25 | CVE-2024-20433 | A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. |
6.5 | 2024-09-25 | CVE-2024-20414 | A vulnerability in the web UI feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system through the web UI. This vulnerability is due to incorrectly accepting configuration changes through the HTTP GET method. An attacker could exploit this vulnerability by persuading a currently authenticated administrator to follow a crafted link. A successful exploit could allow the attacker to change the configuration of the affected device. |
9.1 | 2023-09-27 | CVE-2023-20186 | A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP). This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device. |
6.6 | 2023-09-27 | CVE-2023-20109 | A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory. |
7.5 | 2023-03-23 | CVE-2023-20080 | A vulnerability in the IPv6 DHCP version 6 (DHCPv6) relay and server features of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to insufficient validation of data boundaries. An attacker could exploit this vulnerability by sending crafted DHCPv6 messages to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly. |
7.7 | 2022-10-10 | CVE-2022-20920 | A vulnerability in the SSH implementation of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to improper handling of resources during an exceptional situation. An attacker could exploit this vulnerability by continuously connecting to an affected device and sending specific SSH requests. A successful exploit could allow the attacker to cause the affected device to reload. |
6.5 | 2022-04-15 | CVE-2022-20761 | A vulnerability in the integrated wireless access point (AP) packet processing of the Cisco 1000 Series Connected Grid Router (CGR1K) could allow an unauthenticated, adjacent attacker to cause a denial of service condition on an affected device. This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the integrated AP to stop processing traffic, resulting in a DoS condition. It may be necessary to manually reload the CGR1K to restore AP operation. |
6.7 | 2022-04-15 | CVE-2022-20727 | Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. |
7.5 | 2022-04-15 | CVE-2022-20726 | Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. |
4.8 | 2022-04-15 | CVE-2022-20725 | Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. |
5.3 | 2022-04-15 | CVE-2022-20724 | Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. |
8.6 | 2022-04-15 | CVE-2022-20697 | A vulnerability in the web services interface of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper resource management in the HTTP server code. An attacker could exploit this vulnerability by sending a large number of HTTP requests to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. |
6.7 | 2022-04-15 | CVE-2022-20677 | Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. |
4.6 | 2022-04-15 | CVE-2022-20661 | Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory. |
7.4 | 2021-09-23 | CVE-2021-34714 | A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process. |
5.3 | 2021-09-23 | CVE-2021-34705 | A vulnerability in the Voice Telephony Service Provider (VTSP) service of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured destination patterns and dial arbitrary numbers. This vulnerability is due to insufficient validation of dial strings at Foreign Exchange Office (FXO) interfaces. An attacker could exploit this vulnerability by sending a malformed dial string to an affected device via either the ISDN protocol or SIP. A successful exploit could allow the attacker to conduct toll fraud, resulting in unexpected financial impact to affected customers. |
6.5 | 2021-09-23 | CVE-2021-34703 | A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device. |
7.7 | 2021-09-23 | CVE-2021-34699 | A vulnerability in the TrustSec CLI parser of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to an improper interaction between the web UI and the CLI parser. An attacker could exploit this vulnerability by requesting a particular CLI command to be run through the web UI. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. |
7.7 | 2021-09-23 | CVE-2021-1620 | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition. |
7.5 | 2021-03-24 | CVE-2021-1460 | A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition. |
7.8 | 2021-03-24 | CVE-2021-1392 | A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device. |
6.7 | 2021-03-24 | CVE-2021-1391 | A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege. |
6.5 | 2021-03-24 | CVE-2021-1385 | A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system. |
5.8 | 2021-03-24 | CVE-2021-1377 | A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets. This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
29% (116) | CWE-20 | Improper Input Validation |
22% (89) | CWE-399 | Resource Management Errors |
9% (37) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
4% (17) | CWE-200 | Information Exposure |
3% (15) | CWE-264 | Permissions, Privileges, and Access Controls |
3% (13) | CWE-287 | Improper Authentication |
3% (12) | CWE-362 | Race Condition |
2% (9) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
2% (8) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (8) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
1% (7) | CWE-772 | Missing Release of Resource after Effective Lifetime |
1% (7) | CWE-310 | Cryptographic Issues |
1% (6) | CWE-16 | Configuration |
1% (5) | CWE-787 | Out-of-bounds Write |
1% (5) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (4) | CWE-295 | Certificate Issues |
0% (3) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (3) | CWE-665 | Improper Initialization |
0% (3) | CWE-284 | Access Control (Authorization) Issues |
0% (3) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
0% (2) | CWE-770 | Allocation of Resources Without Limits or Throttling |
0% (2) | CWE-436 | Interpretation Conflict |
0% (2) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
0% (2) | CWE-326 | Inadequate Encryption Strength |
0% (2) | CWE-189 | Numeric Errors |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-28 | Fuzzing |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-66 | SQL Injection |
CAPEC-67 | String Format Overflow in syslog() |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:5835 | Multiple OS TCP/IP DoS Vulnerabilities |
oval:org.mitre.oval:def:5727 | A TCP SYN packet with target host's address as both source and destination ca... |
oval:org.mitre.oval:def:5874 | Cisco IOS UDP 514 Denial of Service Vulnerability |
oval:org.mitre.oval:def:5575 | Cisco PIX CBAC Fragmentation Attack |
oval:org.mitre.oval:def:5567 | Cisco IOS Remote Router Denial of Service Vulnerability |
oval:org.mitre.oval:def:5827 | Cisco IOS PPP CHAP Authentication Vulnerability |
oval:org.mitre.oval:def:5297 | Cisco IOS access-list "tacacs-ds" or "tacacs" Keyword Vulnerability |
oval:org.mitre.oval:def:5661 | Cisco IOS access-list Keyword Vulnerability |
oval:org.mitre.oval:def:5574 | Cisco IOS Input Access List Packet Leakage Flaw |
oval:org.mitre.oval:def:5938 | Cisco IOS HTTP Configuration Interface Denial of Service Vulnerability |
oval:org.mitre.oval:def:4937 | Cisco Gigabit Switch Routers (GSR) Authentication Circumvention Vulnerability |
oval:org.mitre.oval:def:5918 | Cisco IOS HTTP Server Query Vulnerability |
oval:org.mitre.oval:def:5663 | Cisco IOS HTTP Authorization Circumvention Vulnerability |
oval:org.mitre.oval:def:5644 | Cisco IOS BGP Denial of Service Vulnerability |
oval:org.mitre.oval:def:5818 | Cisco IOS Denial of Service Vulnerability |
oval:org.mitre.oval:def:5892 | Cisco IOS Protocol Check Design Error |
oval:org.mitre.oval:def:5823 | Cisco IOS CDP Denial of Service Vulnerability |
oval:org.mitre.oval:def:5859 | Cisco IOS Malformed PPTP Packet Denial of Service Vulnerability |
oval:org.mitre.oval:def:5784 | Cisco Express Forwarding Information Disclosure vulnerability |
oval:org.mitre.oval:def:5449 | Cisco IOS TFTP Server Long File Name Denial of Service Vulnerability |
oval:org.mitre.oval:def:5803 | Cisco SSH Denial of Service Vulnerability |
oval:org.mitre.oval:def:5849 | Multiple Vendors SSH2 "incorrect length fields" Vulnerability |
oval:org.mitre.oval:def:5721 | Multiple Vendors SSH2 "lists with empty elements or multiple separators" Vuln... |
oval:org.mitre.oval:def:5848 | Multiple Vendors SSH2 "buffer overflow" Vulnerability |
oval:org.mitre.oval:def:5797 | Multiple Vendors SSH2 "null characters in strings" Vulnerability |
SAINT Exploits
Description | Link |
---|---|
Cisco IOS HTTP access level authentication bypass | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76862 | Cisco Unified Communications Manager (CUCM) SIP Message Parsing Remote DoS |
76818 | Cisco IOS IPv6 Component Crafted Echo Request Packet Remote Information Discl... |
76817 | Cisco IOS cat6000-dot1x Component dot1x Infinite Loop unicast EAPoL Protocol ... |
76816 | Cisco IOS cat6000-dot1x Component dot1x Port Weakness Spanning Tree Protocol ... |
76814 | Cisco IOS ethernet-lldp Component 12 LLDP Management Address TLV Weakness LLD... |
76071 | Cisco IOS Expired MPLS TTL ICMPv6 Packet Parsing Remote DoS |
76070 | Cisco IOS Expired MPLS TTL IPv6 Packet Parsing Remote DoS |
76069 | Cisco IOS IP Service Level Agreement (IP SLA) UDP Packet Parsing Remote DoS |
76010 | Cisco IOS ICMP Packet Sequence Handling Remote DoS |
76009 | Cisco IOS DLSw FST IP Protocol 91 Packet Memory Leak Remote DoS |
76008 | Cisco IOS IPv6 Packet Handling Remote DoS |
75928 | Cisco IOS IPS / Zone-Based Firewall HTTP Packet Parsing Remote DoS |
75927 | Cisco IOS IPS / Zone-Based Firewall Leak New Session Flow Creation Memory Exh... |
75925 | Cisco IOS Network Address Translation UDP SIP Packet Parsing Memory Exhaustio... |
75924 | Cisco IOS Network Address Translation MPLS UDP SIP Packet Parsing Remote DoS |
75923 | Cisco IOS Network Address Translation UDP SIP Packet Parsing Remote DoS |
75922 | Cisco IOS Network Address Translation TCP SIP Packet Parsing Remote DoS |
75921 | Cisco IOS Network Address Translation H.323 Packet Parsing Remote DoS |
75920 | Cisco IOS Network Address Translation LDAP Packet Parsing Remote DoS |
75919 | Cisco IOS Memory Leak SIP Packet Parsing Unspecified Remote DoS |
75918 | Cisco IOS Session Control Buffers (SCB) SIP Packet Parsing Voice Service Remo... |
75917 | Cisco IOS SIP Packet Parsing Unspecified Remote DoS |
75916 | Cisco IOS Smart Install Packet Parsing Unspecified Remote Code Execution |
74612 | Cisco IOS Neighbor Discovery (ND) Protocol Fragmented IPv6 Packet Router Adve... |
74606 | Cisco IOS DLSw Narrow Timing Window Malformed Packet Remote DoS |
OpenVAS Exploits
id | Description |
---|---|
2016-05-04 | Name : Cisco IOS Software and IOS XE Software LISP Denial of Service Vulnerability File : nvt/gb_cisco_ios_Cisco-SA-20140514-CVE-2014-3262.nasl |
2016-05-04 | Name : Cisco IOS Software Network Address Translation Vulnerabilities File : nvt/gb_cisco_ios_cisco-sa-20140326-nat.nasl |
2016-05-04 | Name : Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability File : nvt/gb_cisco_ios_cisco-sa-20140326-sip.nasl |
2011-07-15 | Name : ICMP Timestamp Detection File : nvt/gb_icmp_timestamps.nasl |
2009-09-10 | Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723) File : nvt/secpod_ms09-048.nasl |
2009-06-05 | Name : Ubuntu USN-707-1 (cupsys) File : nvt/ubuntu_707_1.nasl |
2009-06-05 | Name : Ubuntu USN-743-1 (gs-gpl) File : nvt/ubuntu_743_1.nasl |
2009-06-05 | Name : Ubuntu USN-744-1 (lcms) File : nvt/ubuntu_744_1.nasl |
2009-01-20 | Name : Ubuntu USN-708-1 (hplip) File : nvt/ubuntu_708_1.nasl |
2008-08-22 | Name : Cisco IOS FTP Server Authentication Bypass Vulnerability File : nvt/cisco_ios_ftp_server_auth_bypass.nasl |
2005-11-03 | Name : SSH Multiple Vulns File : nvt/ssh_multivulns_16122002.nasl |
2005-11-03 | Name : TFTPD overflow File : nvt/tftpd_overflow.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0177 | Cisco IOS Denial of Service Vulnerability Severity: Category I - VMSKEY: V0061143 |
2015-A-0175 | Multiple Vulnerabilities in Cisco IOS XE Severity: Category I - VMSKEY: V0061141 |
2014-B-0113 | Cisco NX-OS Software Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0053881 |
2014-A-0046 | Multiple Vulnerabilities in Cisco IOS XE Severity: Category I - VMSKEY: V0047593 |
2014-A-0045 | Multiple Vulnerabilities in Cisco IOS Severity: Category I - VMSKEY: V0047591 |
2014-B-0001 | Cisco IOS Denial of Service Vulnerability Severity: Category II - VMSKEY: V0043236 |
2014-B-0002 | Cisco IOS XE Denial of Service Vulnerability Severity: Category II - VMSKEY: V0043235 |
2013-A-0210 | Cisco IOS Denial of Service Vulnerability Severity: Category I - VMSKEY: V0042299 |
2013-A-0195 | Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity: Category I - VMSKEY: V0040781 |
2013-A-0184 | Multiple Vulnerabilities in Cisco IOS Severity: Category I - VMSKEY: V0040709 |
2013-A-0185 | Multiple Vulnerabilities in Cisco IOS XE Severity: Category I - VMSKEY: V0040708 |
2013-A-0159 | Cisco IOS XE Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0040042 |
2013-A-0157 | Cisco ASA and Pix Firewall Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0040041 |
2013-B-0086 | Cisco StarOS Remote Security Bypass Vulnerability Severity: Category I - VMSKEY: V0040039 |
2008-B-0068 | Cisco 10000 uBR10012 uBR7200 Series Devices IPC Vulnerability Severity: Category I - VMSKEY: V0017466 |
2008-A-0067 | Cisco uBR10012 Series Devices SNMP Vulnerability Severity: Category I - VMSKEY: V0017461 |
2007-T-0045 | Cisco Multiple Products Extensible Authentication Protocol Denial of Service ... Severity: Category I - VMSKEY: V0015369 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Multiple Operating Systems invalid DHCP option attempt RuleID : 7196 - Type : OS-OTHER - Revision : 13 |
2020-12-08 | Cisco IOS Software VLPWA file read detected RuleID : 55808 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS malformed SIP Via header denial of service attempt RuleID : 54164 - Type : PROTOCOL-VOIP - Revision : 1 |
2020-12-05 | Cisco IOS malformed SIP Via header denial of service attempt RuleID : 54163 - Type : PROTOCOL-VOIP - Revision : 1 |
2020-12-05 | Cisco IOS IKE2 invalid port denial of service attempt RuleID : 54160 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS IKE2 invalid port denial of service attempt RuleID : 54159 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOx Application Environment external VDS control message attempt RuleID : 54155 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS EnergyWise out of bounds read attempt RuleID : 53472 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS EnergyWise integer underflow attempt RuleID : 53471 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS EnergyWise heap buffer overflow attempt RuleID : 53470 - Type : SERVER-OTHER - Revision : 1 |
2014-01-10 | same SRC/DST RuleID : 527 - Type : BAD-TRAFFIC - Revision : 10 |
2020-12-05 | Cisco IOS Web UI cross site request forgery attempt RuleID : 52560 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS Web UI cross site request forgery attempt RuleID : 52559 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS XE FTP Application Layer Gateway denial of service attempt RuleID : 51646 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOx invalid TLS handshake type denial of service attempt RuleID : 51645 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS XE Web UI command injection attempt RuleID : 51625 - Type : SERVER-WEBAPP - Revision : 4 |
2020-12-05 | Cisco IOS XE Web UI command injection attempt RuleID : 51624 - Type : SERVER-WEBAPP - Revision : 4 |
2020-12-05 | Cisco IOS XE Web UI command injection attempt RuleID : 51623 - Type : SERVER-WEBAPP - Revision : 4 |
2020-12-05 | Cisco IOS XE Web UI command injection attempt RuleID : 51622 - Type : SERVER-WEBAPP - Revision : 4 |
2020-12-05 | Cisco IOS XE Web UI command injection attempt RuleID : 50118 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco IOS XE Web UI command injection attempt RuleID : 50117 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-05 | Cisco IOS XE webui execPython access attempt RuleID : 49608 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS SIP calling display name denial of service attempt RuleID : 49607 - Type : PROTOCOL-VOIP - Revision : 1 |
2020-12-05 | Cisco IOS SIP calling display name denial of service attempt RuleID : 49606 - Type : PROTOCOL-VOIP - Revision : 1 |
2018-06-05 | Cisco Smart Install invalid init discovery message denial of service attempt RuleID : 46468 - Type : SERVER-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180926-cmp-ios.nasl - Type: ACT_GATHER_INFO |
2018-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180926-cmp-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180926-ospfv3-dos-ios.nasl - Type: ACT_GATHER_INFO |
2018-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180926-ospfv3-dos-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180926-ptp.nasl - Type: ACT_GATHER_INFO |
2018-04-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-dhcpr3-ios.nasl - Type: ACT_GATHER_INFO |
2018-04-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-dhcpr3-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-04-10 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160928-dns-ios.nasl - Type: ACT_GATHER_INFO |
2018-04-10 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160928-dns-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-ios.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-iosxr.nasl - Type: ACT_GATHER_INFO |
2018-03-29 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-smi2-ios.nasl - Type: ACT_GATHER_INFO |
2018-03-29 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-smi2-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-03-01 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180207-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-11-13 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20171103-bgp-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The remote device is affected by a remote code execution vulnerability. File: cisco-sa-20170317-cmp-dos.nasl - Type: ACT_KILL_HOST |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-ike-ios.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-ike-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-pnp-ios.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-pnp-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-cip.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-nat.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-profinet.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-rbip-dos.nasl - Type: ACT_GATHER_INFO |