Show plain JSON{"id": "CVE-2016-1348", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": true, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2016-03-26T01:59:02.200", "references": [{"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6", "tags": ["Vendor Advisory"], "source": "psirt@cisco.com"}, {"url": "http://www.securitytracker.com/id/1035381", "source": "psirt@cisco.com"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1035381", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821."}, {"lang": "es", "value": "Cisco IOS 15.0 hasta la versi\u00f3n 15.5 y IOS XE 3.3 hasta la versi\u00f3n 3.16 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje DHCPv6 Relay manipulado, tambi\u00e9n conocido como Bug ID CSCus55821."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.0xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1048CA2D-FFA2-4D44-8F2E-3ECFD7A97E55"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.1xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFCA15E2-9FBC-49C7-BF47-7B749A11914B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3xo_3.3.2xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F01AADBF-D870-4B75-9C34-82B534995C47"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34C96C5E-C67E-42DB-A400-872C72723397"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "036EB6B4-3EBA-4AC2-A182-9402257E7D85"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AB451EE-C76B-405A-9AEF-28420E9D964D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5e_3.5.3e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D070F4E-0539-45C2-B5FC-486135DCA5B1"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s_3.5.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D03DF484-5044-40A0-90D5-010A4EACB884"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s_3.5.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C06826A5-1E47-43F8-BA06-DCEE41B1D298"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s_3.5.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF975D9D-126B-4E0B-BA5E-7E4A429275F3"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46D09504-050B-477B-A77C-DC6FB356573C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7515382-E7F8-4309-89F7-D2A0CDBCFE14"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.2ae:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4849EC40-FC9C-48A6-B0E1-F084737DC860"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B217689-9550-4465-9252-95BB53B3165E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6e_3.6.3e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B662063-15FE-46A0-97D5-A10A8C44D2A4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6s_3.6.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33FADC21-F6C7-4D97-94C7-3552C3A5830E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6s_3.6.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39FA1C3D-01CB-4E26-9F81-6F53B6195083"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6s_3.6.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65CB65CA-4427-491D-BB64-A4D9D9EAE8D0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7e_3.7.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5141179-58CC-42CC-B7C3-881E452BAF0E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7e_3.7.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F4F220A-ADA8-4D51-A41F-DC9607285940"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7e_3.7.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21577E9B-D717-43EA-AB71-533BCDD1379D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E677D95D-14DC-475D-978D-6E2A11FD7F8C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CE969A4-9810-42DF-A92C-CD488CEB1150"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2CEB4AE-C963-4E8D-923D-8940E93BE51C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.2ts:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61E4FE90-CADD-4A39-A343-8C688FA4EDE7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48F5CB41-DC88-42D0-A7AD-F8DAA5386554"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.4as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97399C68-252F-4B89-A20F-A15C5BC51DDC"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B648A93-E55B-487F-B6EE-2E97ED21BED7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.5s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "287DE66C-0EA8-4404-A42E-11776B3D7852"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.6s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D3F59AE-7E69-4694-AFBF-CE278B3BE32F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s_3.7.7s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A95E7272-57D4-4DCC-A3B1-82C477439177"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8e_3.8.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FFE5D14-0382-4BEB-988C-AC9982F8798F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s_3.8.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "532A0CC6-614F-4690-A845-E4CB2C05AEE6"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s_3.8.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED4A9A0A-3DB5-4BE4-B6F7-3BE491C4F973"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s_3.8.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23A5201B-747B-4525-8707-F097051AD0A3"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.0as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F66E1DA-94E4-4AEE-BCF6-022B8E966C65"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43082336-50F9-49D2-91EF-823249F2366B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.1as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBD67821-EEBE-49D4-8AAB-4FF81370A976"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F2B3E54-746F-48B7-8DA4-4827BC450841"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9s_3.9.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE4657ED-003D-48C1-9744-56AA825C96AE"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E659A9C2-4E00-45F3-8F70-D9E18CDEE8D1"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B359E9A-65D2-447D-AA44-BEA158622923"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.1xbs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B217F6BD-D867-459A-AC5E-760F0BD36602"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E1B040D-CE1A-41A3-B0E9-1AA0CFC29899"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2CE31EB-5B95-49EC-8955-0D47DDA344CA"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD279792-84E4-4E9C-9DBD-2E0689279981"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.5s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67CF54E1-2890-4F70-81A1-04AFB98CC2BD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s_3.10.6s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "137FCB00-9FD5-4C45-9DE4-EC4BB2679049"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "186A4D4A-5977-45BC-A054-72B20FA574FC"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DEF72D7-D889-4197-8469-A849050DE808"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "737754AA-C961-433E-B9D0-7C7ED0310F0A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFCFC44D-F618-457B-BD53-F09224F1C599"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.11s_3.11.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BC5C495-4CFE-4126-A358-5E4B40D17CC2"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C2BB58F-437A-4051-8FC4-C16CFD99AC12"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "348B6EB5-4DCF-41EA-BD36-C2A150F0F55C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "588F5074-C8F3-4D62-89BF-EE0E3945921E"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42D06EFA-5E74-4868-99DE-81278EA12119"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.12s_3.12.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F16B0E5-30F9-4C2A-A492-F0EF522843A7"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73D0F3A6-14D7-4E83-A2E2-2D0FD545DD6C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "663B2239-BC08-4C0C-A16C-FA7CFD0B1F1C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27806BF7-0971-4F71-A0CC-A9FADEF40F22"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.2as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6D9A836-B48E-4961-B51C-2014D2859922"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF0A7ED7-901B-4382-8666-E65A6880C756"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC8FBD67-6D74-44EB-A86D-DD8C98DA4998"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13s_3.13.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42425169-F2EE-4157-9AA6-CF1B4FD12B72"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E1BE381-4C2A-45B1-9647-FB1581BF687A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "398B04EF-01AD-4C91-B141-0266886AEED2"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F103A8AB-E32B-487D-9640-5CBB33E0FF5A"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14s_3.14.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDA1DC5E-8504-4617-A1FC-86B3F912D556"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26E62379-6C6E-4B50-97FF-6183F048750F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1cs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BEB3538-C2E0-4C44-ACE2-A022A118105F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD1C0761-BC14-4FD7-B852-88EAB4E78F83"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s_3.15.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9C5187C-C7E0-4446-B528-C5DE1AAB90ED"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.0cs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70C6DF0C-DC72-43FD-AD44-563075885D7C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CB7CB45-0D3C-450F-A4F4-048D4266693B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.1as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDEE8CE-B4E5-4E2F-81D9-3CCECAB234E6"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16s_3.16.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13282A28-8990-4585-93E4-38384E1D174D"}, {"criteria": "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AF8ACF6-2BDF-49C2-B92F-2207D83664BF", "versionEndExcluding": "2017-01-06"}, {"criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A5867B4-EC19-45D4-87BE-867E1D41ECD5"}, {"criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53"}, {"criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E", "versionEndExcluding": "2.50\\(aazi.0\\)c0"}, {"criteria": "cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "83223AC7-22F3-4FCA-B11B-B769086DCF04"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@cisco.com"}