ID

VAR-201701-0855


CVE

CVE-2016-9216


TITLE

Cisco ASR 5000 Software ipsecmgr Service disruption in the process (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-007065

DESCRIPTION

An IKE Packet Parsing Denial of Service Vulnerability in the ipsecmgr process of Cisco ASR 5000 Software could allow an unauthenticated, remote attacker to cause the ipsecmgr process to reload. More Information: CSCuy06917 CSCuy45036 CSCuy59525. Known Affected Releases: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Known Fixed Releases: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135. Vendors have confirmed this vulnerability Bug ID CSCuy06917 , CSCuy45036 , CSCuy59525 It is released as.By an authenticated remote attacker, ipsecmgr The process may be reloaded. Cisco ASR5000 Series Software is a 5000 series wireless controller product from Cisco. An attacker can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuy06917, CSCuy45036 and CSCuy59525

Trust: 2.52

sources: NVD: CVE-2016-9216 // JVNDB: JVNDB-2016-007065 // CNVD: CNVD-2017-00903 // BID: 95629 // VULHUB: VHN-98036

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-00903

AFFECTED PRODUCTS

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.0

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.1.0

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.1.a0

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.1.v0

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.m0.62842

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.m0.63229

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.0.v0

Trust: 2.4

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.0.0

Trust: 2.4

vendor:ciscomodel:asr series softwarescope:eqversion:5000

Trust: 0.6

vendor:ciscomodel:asr series softwarescope:eqversion:50000

Trust: 0.3

sources: CNVD: CNVD-2017-00903 // BID: 95629 // JVNDB: JVNDB-2016-007065 // CNNVD: CNNVD-201701-792 // NVD: CVE-2016-9216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-9216
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-9216
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-00903
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201701-792
value: MEDIUM

Trust: 0.6

VULHUB: VHN-98036
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-9216
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-00903
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-98036
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-9216
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-00903 // VULHUB: VHN-98036 // JVNDB: JVNDB-2016-007065 // CNNVD: CNNVD-201701-792 // NVD: CVE-2016-9216

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-98036 // JVNDB: JVNDB-2016-007065 // NVD: CVE-2016-9216

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201701-792

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201701-792

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007065

PATCH

title:cisco-sa-20170118-asrurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-asr

Trust: 0.8

title:Patch for CiscoASR5000SeriesSoftware Denial of Service Vulnerability (CNVD-2017-00903)url:https://www.cnvd.org.cn/patchInfo/show/88575

Trust: 0.6

title:Cisco ASR 5000 Series Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67350

Trust: 0.6

sources: CNVD: CNVD-2017-00903 // JVNDB: JVNDB-2016-007065 // CNNVD: CNNVD-201701-792

EXTERNAL IDS

db:NVDid:CVE-2016-9216

Trust: 3.4

db:BIDid:95629

Trust: 2.6

db:SECTRACKid:1037652

Trust: 1.1

db:JVNDBid:JVNDB-2016-007065

Trust: 0.8

db:CNNVDid:CNNVD-201701-792

Trust: 0.7

db:CNVDid:CNVD-2017-00903

Trust: 0.6

db:VULHUBid:VHN-98036

Trust: 0.1

sources: CNVD: CNVD-2017-00903 // VULHUB: VHN-98036 // BID: 95629 // JVNDB: JVNDB-2016-007065 // CNNVD: CNNVD-201701-792 // NVD: CVE-2016-9216

REFERENCES

url:http://www.securityfocus.com/bid/95629

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170118-asr

Trust: 2.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9216

Trust: 1.4

url:http://www.securitytracker.com/id/1037652

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9216

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2017-00903 // VULHUB: VHN-98036 // BID: 95629 // JVNDB: JVNDB-2016-007065 // CNNVD: CNNVD-201701-792 // NVD: CVE-2016-9216

CREDITS

Cisco

Trust: 0.9

sources: BID: 95629 // CNNVD: CNNVD-201701-792

SOURCES

db:CNVDid:CNVD-2017-00903
db:VULHUBid:VHN-98036
db:BIDid:95629
db:JVNDBid:JVNDB-2016-007065
db:CNNVDid:CNNVD-201701-792
db:NVDid:CVE-2016-9216

LAST UPDATE DATE

2025-04-20T23:16:20.957000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-00903date:2017-02-05T00:00:00
db:VULHUBid:VHN-98036date:2017-02-11T00:00:00
db:BIDid:95629date:2017-01-23T02:11:00
db:JVNDBid:JVNDB-2016-007065date:2017-02-09T00:00:00
db:CNNVDid:CNNVD-201701-792date:2017-01-20T00:00:00
db:NVDid:CVE-2016-9216date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-00903date:2017-02-05T00:00:00
db:VULHUBid:VHN-98036date:2017-01-26T00:00:00
db:BIDid:95629date:2017-01-18T00:00:00
db:JVNDBid:JVNDB-2016-007065date:2017-02-09T00:00:00
db:CNNVDid:CNNVD-201701-792date:2017-01-20T00:00:00
db:NVDid:CVE-2016-9216date:2017-01-26T07:59:00.137