CVE-2016-1328

Published on: 07/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Epc3928 from Cisco contain the following vulnerability:

goform/WClientMACList on Cisco EPC3928 devices allows remote attackers to cause a denial of service (device crash) via a long h_sortWireless parameter, related to a "Gateway Client List Denial of Service" issue, aka Bug ID CSCux24948.

  • CVE-2016-1328 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 7.8 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE COMPLETE

CVE References

Description Tags Link
Multiple security vulnerabilities affecting Cisco EPC3928 - Secorda Exploit
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo MISC secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/
Cisco EPC 3928 - Multiple Vulnerabilities - ASP webapps Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39904
SecurityFocus www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160608 Cisco EPC 3928 Multiple Vulnerabilities
Cisco Model EPC3928 Wireless Residential Gateway CVE-2016-1328 Denial of Service Vulnerability cve.report (archive)
text/html
URL Logo BID 91547

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
HardwareCiscoEpc3928AllAllAllAll
HardwareCiscoEpc3928AllAllAllAll
Operating
System
CiscoEpc3928 Firmware-AllAllAll
Operating
System
CiscoEpc3928 Firmware-AllAllAll
  • cpe:2.3:h:cisco:epc3928:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:epc3928:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:epc3928_firmware:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:epc3928_firmware:-:*:*:*:*:*:*:*: