CVE-2016-6441

Published on: 11/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Ios Xe from Cisco contain the following vulnerability:

A vulnerability in the Transaction Language 1 (TL1) code of Cisco ASR 900 Series routers could allow an unauthenticated, remote attacker to cause a reload of, or remotely execute code on, the affected system. This vulnerability affects Cisco ASR 900 Series Aggregation Services Routers (ASR902, ASR903, and ASR907) that are running the following releases of Cisco IOS XE Software: 3.17.0S 3.17.1S 3.17.2S 3.18.0S 3.18.1S. More Information: CSCuy15175. Known Affected Releases: 15.6(1)S 15.6(2)S. Known Fixed Releases: 15.6(1)S2.12 15.6(1.17)S0.41 15.6(1.17)SP 15.6(2)SP 16.4(0.183) 16.5(0.10).

  • CVE-2016-6441 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Cisco ASR 900 Series Aggregation Services Routers Buffer Overflow Vulnerability Vendor Advisory
tools.cisco.com
text/html
URL Logo CONFIRM tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tl1
Cisco IOS XE Software CVE-2016-6441 Buffer Overflow Vulnerability cve.report (archive)
text/html
URL Logo BID 94072
Cisco ASR 900 Series Router TL1 Port Buffer Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1037179

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CiscoIos Xe3.17.0sAllAllAll
Operating
System
CiscoIos Xe3.17.1sAllAllAll
Operating
System
CiscoIos Xe3.17.2sAllAllAll
Operating
System
CiscoIos Xe3.17sAllAllAll
Operating
System
CiscoIos Xe3.18.0sAllAllAll
Operating
System
CiscoIos Xe3.18.1sAllAllAll
Operating
System
CiscoIos Xe3.18sAllAllAll
Operating
System
CiscoIos Xe3.17.0sAllAllAll
Operating
System
CiscoIos Xe3.17.1sAllAllAll
Operating
System
CiscoIos Xe3.17.2sAllAllAll
Operating
System
CiscoIos Xe3.17sAllAllAll
Operating
System
CiscoIos Xe3.18.0sAllAllAll
Operating
System
CiscoIos Xe3.18.1sAllAllAll
Operating
System
CiscoIos Xe3.18sAllAllAll
  • cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.18s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.17s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:ios_xe:3.18s:*:*:*:*:*:*:*: