ID

VAR-201608-0244


CVE

CVE-2016-1478


TITLE

Cisco IOS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-004313

DESCRIPTION

Cisco IOS 15.5(3)S3, 15.6(1)S2, 15.6(2)S1, and 15.6(2)T1 does not properly dequeue invalid NTP packets, which allows remote attackers to cause a denial of service (interface wedge) by sending many crafted NTP packets, aka Bug ID CSCva35619. Cisco IOS is an operating system developed by Cisco Systems for its network devices. Cisco IOS Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCva35619

Trust: 2.52

sources: NVD: CVE-2016-1478 // JVNDB: JVNDB-2016-004313 // CNVD: CNVD-2016-06186 // BID: 92317 // VULHUB: VHN-90297

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-06186

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.5\(3\)s3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(1\)s2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)t1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.6\(2\)s1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.5(3)s3

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.6(1)s2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.6(2)s1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.6(2)t1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.16.3s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.17.2s

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.18.1s

Trust: 0.8

vendor:ciscomodel:ios software 15.5 s3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios software 15.6 s2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios software 15.6 s1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios software 15.6 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.18.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.17.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.16.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.5 s3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.18.0spscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 mscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 spscope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2016-06186 // BID: 92317 // JVNDB: JVNDB-2016-004313 // CNNVD: CNNVD-201608-180 // NVD: CVE-2016-1478

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1478
value: HIGH

Trust: 1.0

NVD: CVE-2016-1478
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-06186
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201608-180
value: HIGH

Trust: 0.6

VULHUB: VHN-90297
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1478
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-06186
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90297
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1478
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-06186 // VULHUB: VHN-90297 // JVNDB: JVNDB-2016-004313 // CNNVD: CNNVD-201608-180 // NVD: CVE-2016-1478

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-90297 // JVNDB: JVNDB-2016-004313 // NVD: CVE-2016-1478

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201608-180

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201608-180

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004313

PATCH

title:cisco-sa-20160804-wedgeurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160804-wedge

Trust: 0.8

title:Patch for Cisco IOS Denial of Service Vulnerability (CNVD-2016-06186)url:https://www.cnvd.org.cn/patchInfo/show/80250

Trust: 0.6

title:Cisco IOS Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63571

Trust: 0.6

sources: CNVD: CNVD-2016-06186 // JVNDB: JVNDB-2016-004313 // CNNVD: CNNVD-201608-180

EXTERNAL IDS

db:NVDid:CVE-2016-1478

Trust: 3.4

db:BIDid:92317

Trust: 2.0

db:SECTRACKid:1036541

Trust: 1.1

db:JVNDBid:JVNDB-2016-004313

Trust: 0.8

db:CNNVDid:CNNVD-201608-180

Trust: 0.7

db:CNVDid:CNVD-2016-06186

Trust: 0.6

db:VULHUBid:VHN-90297

Trust: 0.1

sources: CNVD: CNVD-2016-06186 // VULHUB: VHN-90297 // BID: 92317 // JVNDB: JVNDB-2016-004313 // CNNVD: CNNVD-201608-180 // NVD: CVE-2016-1478

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160804-wedge

Trust: 2.6

url:http://www.securityfocus.com/bid/92317

Trust: 1.1

url:http://www.securitytracker.com/id/1036541

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1478

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1478

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-06186 // VULHUB: VHN-90297 // BID: 92317 // JVNDB: JVNDB-2016-004313 // CNNVD: CNNVD-201608-180 // NVD: CVE-2016-1478

CREDITS

Cisco

Trust: 0.3

sources: BID: 92317

SOURCES

db:CNVDid:CNVD-2016-06186
db:VULHUBid:VHN-90297
db:BIDid:92317
db:JVNDBid:JVNDB-2016-004313
db:CNNVDid:CNNVD-201608-180
db:NVDid:CVE-2016-1478

LAST UPDATE DATE

2025-04-13T23:37:28.405000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06186date:2016-08-10T00:00:00
db:VULHUBid:VHN-90297date:2017-08-16T00:00:00
db:BIDid:92317date:2016-08-10T09:00:00
db:JVNDBid:JVNDB-2016-004313date:2016-08-17T00:00:00
db:CNNVDid:CNNVD-201608-180date:2016-08-08T00:00:00
db:NVDid:CVE-2016-1478date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-06186date:2016-08-10T00:00:00
db:VULHUBid:VHN-90297date:2016-08-08T00:00:00
db:BIDid:92317date:2016-08-04T00:00:00
db:JVNDBid:JVNDB-2016-004313date:2016-08-17T00:00:00
db:CNNVDid:CNNVD-201608-180date:2016-08-08T00:00:00
db:NVDid:CVE-2016-1478date:2016-08-08T00:59:09.203