Cisco IOS Software CIP Request DoS (cisco-sa-20160928-cip)

high Nessus Plugin ID 94252

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by a denial of service vulnerability in the Common Industrial Protocol (CIP) feature due to improper processing of unusual but valid CIP requests. An unauthenticated, remote attacker can exploit this, via specially crafted CIP requests, to cause the switch to stop processing traffic, requiring a device restart to regain functionality.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCur69036.

See Also

http://www.nessus.org/u?ce256c81

Plugin Details

Severity: High

ID: 94252

File Name: cisco-sa-20160928-cip-ios.nasl

Version: 1.11

Type: combined

Family: CISCO

Published: 10/25/2016

Updated: 11/14/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2016-6391

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/28/2016

Vulnerability Publication Date: 9/28/2016

Reference Information

CVE: CVE-2016-6391

BID: 93197

CISCO-SA: cisco-sa-20160928-cip

CISCO-BUG-ID: CSCur69036