Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2016-09-18 |
Product | Ios | Last view | 2025-05-07 |
Version | 15.5(3)s7 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:cisco:ios |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.6 | 2025-05-07 | CVE-2025-20154 | A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server process to reload unexpectedly if debugs are enabled. This vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows: Security Impact Rating (SIR): Low CVSS Base Score: 3.7 CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L |
0 | 2025-02-05 | CVE-2025-20176 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
7.7 | 2025-02-05 | CVE-2025-20175 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
7.7 | 2025-02-05 | CVE-2025-20174 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
0 | 2025-02-05 | CVE-2025-20173 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
0 | 2025-02-05 | CVE-2025-20172 | A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
0 | 2025-02-05 | CVE-2025-20171 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
7.7 | 2025-02-05 | CVE-2025-20170 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
7.7 | 2025-02-05 | CVE-2025-20169 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system. |
7.5 | 2024-09-25 | CVE-2024-20433 | A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. |
0 | 2024-03-27 | CVE-2024-20312 | A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency. |
7.5 | 2024-03-27 | CVE-2024-20311 | A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note: This vulnerability could be exploited over either IPv4 or IPv6 transport. |
7.5 | 2024-03-27 | CVE-2024-20308 | A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.. |
7.5 | 2024-03-27 | CVE-2024-20307 | A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic. |
9.1 | 2023-09-27 | CVE-2023-20186 | A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP). This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device. |
6.6 | 2023-09-27 | CVE-2023-20109 | A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory. |
7.5 | 2023-03-23 | CVE-2023-20080 | A vulnerability in the IPv6 DHCP version 6 (DHCPv6) relay and server features of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to insufficient validation of data boundaries. An attacker could exploit this vulnerability by sending crafted DHCPv6 messages to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly. |
7.7 | 2022-10-10 | CVE-2022-20920 | A vulnerability in the SSH implementation of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to improper handling of resources during an exceptional situation. An attacker could exploit this vulnerability by continuously connecting to an affected device and sending specific SSH requests. A successful exploit could allow the attacker to cause the affected device to reload. |
5.3 | 2021-09-23 | CVE-2021-34705 | A vulnerability in the Voice Telephony Service Provider (VTSP) service of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured destination patterns and dial arbitrary numbers. This vulnerability is due to insufficient validation of dial strings at Foreign Exchange Office (FXO) interfaces. An attacker could exploit this vulnerability by sending a malformed dial string to an affected device via either the ISDN protocol or SIP. A successful exploit could allow the attacker to conduct toll fraud, resulting in unexpected financial impact to affected customers. |
6.5 | 2021-09-23 | CVE-2021-34703 | A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device. |
7.7 | 2021-09-23 | CVE-2021-34699 | A vulnerability in the TrustSec CLI parser of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to an improper interaction between the web UI and the CLI parser. An attacker could exploit this vulnerability by requesting a particular CLI command to be run through the web UI. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. |
7.7 | 2021-09-23 | CVE-2021-1620 | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition. |
7.5 | 2021-03-24 | CVE-2021-1460 | A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition. |
5.8 | 2021-03-24 | CVE-2021-1377 | A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets. This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition. |
8.8 | 2020-09-23 | CVE-2019-16009 | A vulnerability in the web UI of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
25% (9) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17% (6) | CWE-20 | Improper Input Validation |
5% (2) | CWE-787 | Out-of-bounds Write |
5% (2) | CWE-665 | Improper Initialization |
5% (2) | CWE-436 | Interpretation Conflict |
5% (2) | CWE-399 | Resource Management Errors |
5% (2) | CWE-295 | Certificate Issues |
5% (2) | CWE-200 | Information Exposure |
2% (1) | CWE-805 | Buffer Access with Incorrect Length Value |
2% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
2% (1) | CWE-755 | Improper Handling of Exceptional Conditions |
2% (1) | CWE-667 | Insufficient Locking |
2% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (1) | CWE-129 | Improper Validation of Array Index |
2% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Multiple Operating Systems invalid DHCP option attempt RuleID : 7196 - Type : OS-OTHER - Revision : 13 |
2020-12-05 | Cisco IOS IKE2 invalid port denial of service attempt RuleID : 54160 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS IKE2 invalid port denial of service attempt RuleID : 54159 - Type : SERVER-OTHER - Revision : 1 |
2020-12-05 | Cisco IOS Web UI cross site request forgery attempt RuleID : 52560 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS Web UI cross site request forgery attempt RuleID : 52559 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco IOS XE FTP Application Layer Gateway denial of service attempt RuleID : 51646 - Type : SERVER-OTHER - Revision : 1 |
2017-09-28 | Cisco IOS IKEv2 session initialization denial of service attempt RuleID : 44464 - Type : SERVER-OTHER - Revision : 1 |
2017-09-28 | Cisco IE2000 CIP forward open packet processing null pointer dereference attempt RuleID : 44459 - Type : PROTOCOL-SCADA - Revision : 1 |
2017-09-28 | Cisco IE2000 CIP get attributes all packet processing memory leak attempt RuleID : 44458 - Type : PROTOCOL-SCADA - Revision : 1 |
2017-03-23 | Cisco IOS L2TP invalid message digest AVP denial of service attempt RuleID : 42070 - Type : SERVER-OTHER - Revision : 1 |
2017-03-23 | Cisco IOS DHCP client dummy XID denial of service attempt RuleID : 42060 - Type : SERVER-OTHER - Revision : 3 |
2016-09-29 | Cisco IOS malformed H.450 PER data out of bounds read attempt RuleID : 40298 - Type : PROTOCOL-VOIP - Revision : 1 |
2016-10-10 | Cisco IOS Group-Prime SHA memory disclosure attempt RuleID : 40222-community - Type : SERVER-OTHER - Revision : 5 |
2016-09-16 | Cisco IOS Group-Prime SHA memory disclosure attempt RuleID : 40222 - Type : SERVER-OTHER - Revision : 5 |
2016-10-10 | Cisco IOS Group-Prime MD5 memory disclosure attempt RuleID : 40221-community - Type : SERVER-OTHER - Revision : 5 |
2016-09-16 | Cisco IOS Group-Prime MD5 memory disclosure attempt RuleID : 40221 - Type : SERVER-OTHER - Revision : 5 |
2016-10-10 | Cisco IOS Group-Prime memory disclosure exfiltration attempt RuleID : 40220-community - Type : SERVER-OTHER - Revision : 6 |
2016-09-16 | Cisco IOS Group-Prime memory disclosure exfiltration attempt RuleID : 40220 - Type : SERVER-OTHER - Revision : 6 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-iosxr.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-04-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20180328-lldp-ios.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-ike-ios_xe.nasl - Type: ACT_GATHER_INFO |
2017-10-06 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-ike-ios.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-rbip-dos.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-profinet.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-nat.nasl - Type: ACT_GATHER_INFO |
2017-10-05 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-cip.nasl - Type: ACT_GATHER_INFO |
2017-10-02 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170927-dhcp-ios.nasl - Type: ACT_GATHER_INFO |
2017-07-07 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170629-snmp-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-07-07 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170629-snmp-ios.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-l2tp-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-l2tp-ios.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-dhcpc-iosxe.nasl - Type: ACT_GATHER_INFO |
2017-03-28 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20170322-dhcpc-ios.nasl - Type: ACT_GATHER_INFO |
2017-01-26 | Name: A remote device is affected by an information disclosure vulnerability. File: cisco_ikev1_info_disclosure.nasl - Type: ACT_ATTACK |
2016-09-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160916-ikev1-ios.nasl - Type: ACT_GATHER_INFO |
2016-09-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160916-ikev1-iosxr.nasl - Type: ACT_GATHER_INFO |
2016-09-27 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20160916-ikev1-iosxe.nasl - Type: ACT_GATHER_INFO |