This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 1992-12-10
Product Ios Last view 2021-09-23
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:* 155
cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:* 149
cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:* 131
cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:* 127
cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:* 123
cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:* 121
cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:* 120
cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:* 120
cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:* 112
cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:* 112
cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:* 112
cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:* 112
cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:* 112
cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:* 111
cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:* 111
cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:* 111
cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:* 111
cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:* 111
cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:* 111
cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:* 110
cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:* 110
cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:* 110
cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:* 110
cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:* 110
cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:* 110
cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:* 109
cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:* 108
cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:* 108
cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:* 108
cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:* 108
cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:* 108
cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:* 107
cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:* 106
cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:* 106
cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:* 106
cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:* 106

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.4 2021-09-23 CVE-2021-34714

A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process.

5.3 2021-09-23 CVE-2021-34705

A vulnerability in the Voice Telephony Service Provider (VTSP) service of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured destination patterns and dial arbitrary numbers. This vulnerability is due to insufficient validation of dial strings at Foreign Exchange Office (FXO) interfaces. An attacker could exploit this vulnerability by sending a malformed dial string to an affected device via either the ISDN protocol or SIP. A successful exploit could allow the attacker to conduct toll fraud, resulting in unexpected financial impact to affected customers.

6.5 2021-09-23 CVE-2021-34703

A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device.

7.7 2021-09-23 CVE-2021-34699

A vulnerability in the TrustSec CLI parser of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to an improper interaction between the web UI and the CLI parser. An attacker could exploit this vulnerability by requesting a particular CLI command to be run through the web UI. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

7.7 2021-09-23 CVE-2021-1620

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.

7.5 2021-03-24 CVE-2021-1460

A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition.

7.8 2021-03-24 CVE-2021-1392

A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.

6.7 2021-03-24 CVE-2021-1391

A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.

6.5 2021-03-24 CVE-2021-1385

A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.

5.8 2021-03-24 CVE-2021-1377

A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets. This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition.

7.5 2020-09-24 CVE-2020-3479

A vulnerability in the implementation of Multiprotocol Border Gateway Protocol (MP-BGP) for the Layer 2 VPN (L2VPN) Ethernet VPN (EVPN) address family in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of Border Gateway Protocol (BGP) update messages that contain crafted EVPN attributes. An attacker could exploit this vulnerability by sending BGP update messages with specific, malformed attributes to an affected device. A successful exploit could allow the attacker to cause an affected device to crash, resulting in a DoS condition.

5.5 2020-09-24 CVE-2020-3477

A vulnerability in the CLI parser of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker to access files from the flash: filesystem. The vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker could exploit this vulnerability by using a specific command at the command line. A successful exploit could allow the attacker to obtain read-only access to files that are located on the flash: filesystem that otherwise might not have been accessible.

6 2020-09-24 CVE-2020-3476

A vulnerability in the CLI implementation of a specific command of Cisco IOS XE Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying host file system. The vulnerability is due to insufficient validation of the parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of any arbitrary file that resides on the underlying host file system.

8.1 2020-09-24 CVE-2020-3475

Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to gain unauthorized read access to sensitive data or cause the web management software to hang or crash, resulting in a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.

9.1 2020-09-24 CVE-2020-3426

A vulnerability in the implementation of the Low Power, Wide Area (LPWA) subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data or cause a denial of service (DoS) condition. The vulnerability is due to a lack of input and validation checking mechanisms for virtual-LPWA (VLPWA) protocol modem messages. An attacker could exploit this vulnerability by supplying crafted packets to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data or cause the VLPWA interface of the affected device to shut down, resulting in DoS condition.

7.4 2020-09-24 CVE-2020-3409

A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to crash and reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to insufficient processing logic for crafted PROFINET packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted PROFINET packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to crash and reload, resulting in a DoS condition on the device.

8.8 2020-09-23 CVE-2019-16009

A vulnerability in the web UI of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device.

9.8 2020-06-03 CVE-2020-3258

Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory.

8.1 2020-06-03 CVE-2020-3257

Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

7.7 2020-06-03 CVE-2020-3235

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.

8.8 2020-06-03 CVE-2020-3234

A vulnerability in the virtual console authentication of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated but low-privileged, local attacker to log in to the Virtual Device Server (VDS) of an affected device by using a set of default credentials. The vulnerability is due to the presence of weak, hard-coded credentials. An attacker could exploit this vulnerability by authenticating to the targeted device and then connecting to VDS through the device’s virtual console by using the static credentials. A successful exploit could allow the attacker to access the Linux shell of VDS as the root user.

4.7 2020-06-03 CVE-2020-3231

A vulnerability in the 802.1X feature of Cisco Catalyst 2960-L Series Switches and Cisco Catalyst CDB-8P Switches could allow an unauthenticated, adjacent attacker to forward broadcast traffic before being authenticated on the port. The vulnerability exists because broadcast traffic that is received on the 802.1X-enabled port is mishandled. An attacker could exploit this vulnerability by sending broadcast traffic on the port before being authenticated. A successful exploit could allow the attacker to send and receive broadcast traffic on the 802.1X-enabled port before authentication.

7.5 2020-06-03 CVE-2020-3230

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent IKEv2 from establishing new security associations. The vulnerability is due to incorrect handling of crafted IKEv2 SA-Init packets. An attacker could exploit this vulnerability by sending crafted IKEv2 SA-Init packets to the affected device. An exploit could allow the attacker to cause the affected device to reach the maximum incoming negotiation limits and prevent further IKEv2 security associations from being formed.

8.6 2020-06-03 CVE-2020-3228

A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

8.6 2020-06-03 CVE-2020-3226

A vulnerability in the Session Initiation Protocol (SIP) library of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on received SIP messages. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service condition.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
30% (122) CWE-20 Improper Input Validation
24% (97) CWE-399 Resource Management Errors
9% (36) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (17) CWE-200 Information Exposure
3% (15) CWE-264 Permissions, Privileges, and Access Controls
3% (13) CWE-287 Improper Authentication
2% (11) CWE-362 Race Condition
2% (9) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (9) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
1% (7) CWE-310 Cryptographic Issues
1% (7) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (6) CWE-772 Missing Release of Resource after Effective Lifetime
1% (6) CWE-16 Configuration
1% (4) CWE-295 Certificate Issues
0% (3) CWE-787 Out-of-bounds Write
0% (3) CWE-352 Cross-Site Request Forgery (CSRF)
0% (3) CWE-284 Access Control (Authorization) Issues
0% (2) CWE-770 Allocation of Resources Without Limits or Throttling
0% (2) CWE-665 Improper Initialization
0% (2) CWE-436 Interpretation Conflict
0% (2) CWE-189 Numeric Errors
0% (2) CWE-123 Write-what-where Condition
0% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (2) CWE-19 Data Handling
0% (1) CWE-798 Use of Hard-coded Credentials

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-47 Buffer Overflow via Parameter Expansion

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:5835 Multiple OS TCP/IP DoS Vulnerabilities
oval:org.mitre.oval:def:5727 A TCP SYN packet with target host's address as both source and destination ca...
oval:org.mitre.oval:def:5874 Cisco IOS UDP 514 Denial of Service Vulnerability
oval:org.mitre.oval:def:5575 Cisco PIX CBAC Fragmentation Attack
oval:org.mitre.oval:def:5567 Cisco IOS Remote Router Denial of Service Vulnerability
oval:org.mitre.oval:def:5827 Cisco IOS PPP CHAP Authentication Vulnerability
oval:org.mitre.oval:def:5297 Cisco IOS access-list "tacacs-ds" or "tacacs" Keyword Vulnerability
oval:org.mitre.oval:def:5661 Cisco IOS access-list Keyword Vulnerability
oval:org.mitre.oval:def:5574 Cisco IOS Input Access List Packet Leakage Flaw
oval:org.mitre.oval:def:5938 Cisco IOS HTTP Configuration Interface Denial of Service Vulnerability
oval:org.mitre.oval:def:4937 Cisco Gigabit Switch Routers (GSR) Authentication Circumvention Vulnerability
oval:org.mitre.oval:def:5918 Cisco IOS HTTP Server Query Vulnerability
oval:org.mitre.oval:def:5663 Cisco IOS HTTP Authorization Circumvention Vulnerability
oval:org.mitre.oval:def:5644 Cisco IOS BGP Denial of Service Vulnerability
oval:org.mitre.oval:def:5818 Cisco IOS Denial of Service Vulnerability
oval:org.mitre.oval:def:5892 Cisco IOS Protocol Check Design Error
oval:org.mitre.oval:def:5823 Cisco IOS CDP Denial of Service Vulnerability
oval:org.mitre.oval:def:5859 Cisco IOS Malformed PPTP Packet Denial of Service Vulnerability
oval:org.mitre.oval:def:5784 Cisco Express Forwarding Information Disclosure vulnerability
oval:org.mitre.oval:def:5449 Cisco IOS TFTP Server Long File Name Denial of Service Vulnerability
oval:org.mitre.oval:def:5803 Cisco SSH Denial of Service Vulnerability
oval:org.mitre.oval:def:5849 Multiple Vendors SSH2 "incorrect length fields" Vulnerability
oval:org.mitre.oval:def:5721 Multiple Vendors SSH2 "lists with empty elements or multiple separators" Vuln...
oval:org.mitre.oval:def:5848 Multiple Vendors SSH2 "buffer overflow" Vulnerability
oval:org.mitre.oval:def:5797 Multiple Vendors SSH2 "null characters in strings" Vulnerability

SAINT Exploits

Description Link
Cisco IOS HTTP access level authentication bypass More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
76862 Cisco Unified Communications Manager (CUCM) SIP Message Parsing Remote DoS
76818 Cisco IOS IPv6 Component Crafted Echo Request Packet Remote Information Discl...
76817 Cisco IOS cat6000-dot1x Component dot1x Infinite Loop unicast EAPoL Protocol ...
76816 Cisco IOS cat6000-dot1x Component dot1x Port Weakness Spanning Tree Protocol ...
76814 Cisco IOS ethernet-lldp Component 12 LLDP Management Address TLV Weakness LLD...
76071 Cisco IOS Expired MPLS TTL ICMPv6 Packet Parsing Remote DoS
76070 Cisco IOS Expired MPLS TTL IPv6 Packet Parsing Remote DoS
76069 Cisco IOS IP Service Level Agreement (IP SLA) UDP Packet Parsing Remote DoS
76010 Cisco IOS ICMP Packet Sequence Handling Remote DoS
76009 Cisco IOS DLSw FST IP Protocol 91 Packet Memory Leak Remote DoS
76008 Cisco IOS IPv6 Packet Handling Remote DoS
75928 Cisco IOS IPS / Zone-Based Firewall HTTP Packet Parsing Remote DoS
75927 Cisco IOS IPS / Zone-Based Firewall Leak New Session Flow Creation Memory Exh...
75925 Cisco IOS Network Address Translation UDP SIP Packet Parsing Memory Exhaustio...
75924 Cisco IOS Network Address Translation MPLS UDP SIP Packet Parsing Remote DoS
75923 Cisco IOS Network Address Translation UDP SIP Packet Parsing Remote DoS
75922 Cisco IOS Network Address Translation TCP SIP Packet Parsing Remote DoS
75921 Cisco IOS Network Address Translation H.323 Packet Parsing Remote DoS
75920 Cisco IOS Network Address Translation LDAP Packet Parsing Remote DoS
75919 Cisco IOS Memory Leak SIP Packet Parsing Unspecified Remote DoS
75918 Cisco IOS Session Control Buffers (SCB) SIP Packet Parsing Voice Service Remo...
75917 Cisco IOS SIP Packet Parsing Unspecified Remote DoS
75916 Cisco IOS Smart Install Packet Parsing Unspecified Remote Code Execution
74612 Cisco IOS Neighbor Discovery (ND) Protocol Fragmented IPv6 Packet Router Adve...
74606 Cisco IOS DLSw Narrow Timing Window Malformed Packet Remote DoS

OpenVAS Exploits

id Description
2016-05-04 Name : Cisco IOS Software and IOS XE Software LISP Denial of Service Vulnerability
File : nvt/gb_cisco_ios_Cisco-SA-20140514-CVE-2014-3262.nasl
2016-05-04 Name : Cisco IOS Software Network Address Translation Vulnerabilities
File : nvt/gb_cisco_ios_cisco-sa-20140326-nat.nasl
2016-05-04 Name : Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
File : nvt/gb_cisco_ios_cisco-sa-20140326-sip.nasl
2011-07-15 Name : ICMP Timestamp Detection
File : nvt/gb_icmp_timestamps.nasl
2009-09-10 Name : Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
File : nvt/secpod_ms09-048.nasl
2009-06-05 Name : Ubuntu USN-707-1 (cupsys)
File : nvt/ubuntu_707_1.nasl
2009-06-05 Name : Ubuntu USN-743-1 (gs-gpl)
File : nvt/ubuntu_743_1.nasl
2009-06-05 Name : Ubuntu USN-744-1 (lcms)
File : nvt/ubuntu_744_1.nasl
2009-01-20 Name : Ubuntu USN-708-1 (hplip)
File : nvt/ubuntu_708_1.nasl
2008-08-22 Name : Cisco IOS FTP Server Authentication Bypass Vulnerability
File : nvt/cisco_ios_ftp_server_auth_bypass.nasl
2005-11-03 Name : SSH Multiple Vulns
File : nvt/ssh_multivulns_16122002.nasl
2005-11-03 Name : TFTPD overflow
File : nvt/tftpd_overflow.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0175 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0061141
2015-A-0177 Cisco IOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0061143
2014-B-0113 Cisco NX-OS Software Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0053881
2014-A-0045 Multiple Vulnerabilities in Cisco IOS
Severity: Category I - VMSKEY: V0047591
2014-A-0046 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0047593
2014-B-0002 Cisco IOS XE Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0043235
2014-B-0001 Cisco IOS Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0043236
2013-A-0210 Cisco IOS Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0042299
2013-A-0195 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0040781
2013-A-0185 Multiple Vulnerabilities in Cisco IOS XE
Severity: Category I - VMSKEY: V0040708
2013-A-0184 Multiple Vulnerabilities in Cisco IOS
Severity: Category I - VMSKEY: V0040709
2013-B-0086 Cisco StarOS Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040039
2013-A-0157 Cisco ASA and Pix Firewall Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040041
2013-A-0159 Cisco IOS XE Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040042
2007-T-0045 Cisco Multiple Products Extensible Authentication Protocol Denial of Service ...
Severity: Category I - VMSKEY: V0015369

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Multiple Operating Systems invalid DHCP option attempt
RuleID : 7196 - Type : OS-OTHER - Revision : 13
2020-12-08 Cisco IOS Software VLPWA file read detected
RuleID : 55808 - Type : POLICY-OTHER - Revision : 1
2020-12-05 Cisco IOS malformed SIP Via header denial of service attempt
RuleID : 54164 - Type : PROTOCOL-VOIP - Revision : 1
2020-12-05 Cisco IOS malformed SIP Via header denial of service attempt
RuleID : 54163 - Type : PROTOCOL-VOIP - Revision : 1
2020-12-05 Cisco IOS IKE2 invalid port denial of service attempt
RuleID : 54160 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS IKE2 invalid port denial of service attempt
RuleID : 54159 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOx Application Environment external VDS control message attempt
RuleID : 54155 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS EnergyWise out of bounds read attempt
RuleID : 53472 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS EnergyWise integer underflow attempt
RuleID : 53471 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS EnergyWise heap buffer overflow attempt
RuleID : 53470 - Type : SERVER-OTHER - Revision : 1
2014-01-10 same SRC/DST
RuleID : 527 - Type : BAD-TRAFFIC - Revision : 10
2020-12-05 Cisco IOS Web UI cross site request forgery attempt
RuleID : 52560 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco IOS Web UI cross site request forgery attempt
RuleID : 52559 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco IOS XE FTP Application Layer Gateway denial of service attempt
RuleID : 51646 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOx invalid TLS handshake type denial of service attempt
RuleID : 51645 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51625 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51624 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51623 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 51622 - Type : SERVER-WEBAPP - Revision : 4
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 50118 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco IOS XE Web UI command injection attempt
RuleID : 50117 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco IOS XE webui execPython access attempt
RuleID : 49608 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco IOS SIP calling display name denial of service attempt
RuleID : 49607 - Type : PROTOCOL-VOIP - Revision : 1
2020-12-05 Cisco IOS SIP calling display name denial of service attempt
RuleID : 49606 - Type : PROTOCOL-VOIP - Revision : 1
2018-06-05 Cisco Smart Install invalid init discovery message denial of service attempt
RuleID : 46468 - Type : SERVER-OTHER - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-cmp-ios.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-cmp-iosxe.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ospfv3-dos-ios.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ospfv3-dos-iosxe.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180926-ptp.nasl - Type: ACT_GATHER_INFO
2018-04-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-dhcpr3-ios.nasl - Type: ACT_GATHER_INFO
2018-04-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-dhcpr3-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160928-dns-ios.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160928-dns-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-ios.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-iosxe.nasl - Type: ACT_GATHER_INFO
2018-04-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-lldp-iosxr.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-smi2-ios.nasl - Type: ACT_GATHER_INFO
2018-03-29 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180328-smi2-iosxe.nasl - Type: ACT_GATHER_INFO
2018-03-01 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180207-iosxe.nasl - Type: ACT_GATHER_INFO
2017-11-13 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171103-bgp-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-11 Name: The remote device is affected by a remote code execution vulnerability.
File: cisco-sa-20170317-cmp-dos.nasl - Type: ACT_KILL_HOST
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-ike-ios.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-ike-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-pnp-ios.nasl - Type: ACT_GATHER_INFO
2017-10-06 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-pnp-ios_xe.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-cip.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-nat.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-profinet.nasl - Type: ACT_GATHER_INFO
2017-10-05 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170927-rbip-dos.nasl - Type: ACT_GATHER_INFO