Cisco IOS XR Software IPv6 Malformed Packet DoS (cisco-sa-20140611-ipv6)

high Nessus Plugin ID 76312


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, the version of Cisco IOS XR running on the remote host is affected by a denial of service vulnerability due to the improper handling of IPv6 packets. A remote, unauthenticated attacker can cause the device to lock up by rapidly sending specially crafted IPv6 packets.

Note that this issue only affects Trident-based line cards on Cisco ASR 9000 series routers. Also, if IPv6 is not enabled, the device can still be exploited by a host on an adjacent network.


Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20140611-ipv6.

See Also

Plugin Details

Severity: High

ID: 76312

File Name: cisco-sa-20140611-ipv6-iosxr.nasl

Version: 1.10

Type: combined

Family: CISCO

Published: 6/30/2014

Updated: 4/8/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2014-2176

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/22/2014

Vulnerability Publication Date: 6/11/2014

Reference Information

CVE: CVE-2014-2176

BID: 68005

CISCO-SA: cisco-sa-20140611-ipv6