CVE-2016-6455
Published Nov 3, 2016
Last updated 7 years ago
Overview
- Description
- A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FA3A1A8-8887-425E-B69E-54C7541087B3" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.0.0.57828:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE69A4E1-0E64-4C80-83B9-2595AD786628" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.0.0.59167:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EA80B89-0EF8-4CD6-AFE8-ECEED1EC4CB6" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.0.0.59211:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15DC3259-D652-48D4-B702-876A0118678F" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.0.l0.59219:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CAB002D-F6FC-4CF6-BAC8-D004196FE8EE" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9391685F-D6CB-4C0C-AA05-B18FDC72956F" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.1.0.59776:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8324B02-1572-4AF2-8ECC-4EF0A4F7E54F" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.1.0.59780:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252F8DBD-D534-42DD-8453-5347FF7A4C5E" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.1_base:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3623A408-299E-4044-B64A-F250AFDFE1E3" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCDC5CFA-9557-4EC0-815B-E9357469A77C" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.3_base:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E527CF15-AEF3-4D9C-840D-77E7126FA2E3" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:18.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67C64A96-25D5-4D54-9C2C-EBD1DEE1D858" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "903698E4-09B3-4D2D-B32B-BBC93BA9D112" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.0.m0.60737:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CC868B9-5620-4C27-BE41-1159BAB9A588" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.0.m0.60828:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E781AA0-392F-41C1-960D-E07981B34CB5" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.0.m0.61045:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E331E868-4E6C-4AD8-9ECE-346C6901816A" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "393BD120-C307-49C2-92FB-64383F79EA5F" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.1.0.61559:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "430419D4-5184-48CC-8DDB-2E1BDDCAE9E4" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "322B6E97-DF1F-45D3-8935-2FF982E19EF0" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:19.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E5CBAC-6114-4D07-ADBB-50C7741876D9" }, { "criteria": "cpe:2.3:o:cisco:asr_5000_software:20.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19EAF4FE-F46A-4801-B7C1-F1372107A5A5" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "301681DF-2A9E-4A91-9918-4A46153ADC01" } ], "operator": "OR" } ], "operator": "AND" } ]