Vulnerability Details : CVE-2016-1399
The packet-processing microcode in Cisco IOS 15.2(2)EA, 15.2(2)EA1, 15.2(2)EA2, and 15.2(4)EA on Industrial Ethernet 4000 devices and 15.2(2)EB and 15.2(2)EB1 on Industrial Ethernet 5000 devices allows remote attackers to cause a denial of service (packet data corruption) via crafted IPv4 ICMP packets, aka Bug ID CSCuy13431.
Vulnerability category: Denial of service
Products affected by CVE-2016-1399
- cpe:2.3:o:cisco:ios:15.2\(2\)ea1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(2\)eb1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(2\)eb:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(2\)ea:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ios:15.2\(4\)ea:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ios:15.2\(2\)ea2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1399
1.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1399
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-1399
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1399
-
https://ics-cert.us-cert.gov/advisories/ICSA-16-175-01
Rockwell Automation Allen-Bradley Stratix 5400 and 5410 Packet Corruption Vulnerability | CISA
-
http://www.securityfocus.com/bid/90665
Cisco Industrial Ethernet 4000 and 5000 Series Switches Remote Security Bypass Vulnerability
-
http://www.securitytracker.com/id/1035898
Cisco Industrial Ethernet Switch Packet Processing Flaw Lets Remote Users Corrupt Queued Data on the Target System - SecurityTracker
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160513-ies
Cisco Industrial Ethernet 4000 and Ethernet 5000 Series Switches ICMP IPv4 Packet Corruption VulnerabilityVendor Advisory
Jump to