navigation bar left navigation bar right

navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Cisco IOS R12.x

This vulnerability report for Cisco IOS R12.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Cisco IOS R12.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Cisco

Product Link View Here (Link to external site)

Affected By 86 Secunia advisories
151 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 5% (4 of 86 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Cisco IOS R12.x, with all vendor patches applied, is rated Less critical .




86 Secunia Advisories in 2003-2014

Secunia has issued a total of 86 Secunia advisories in 2003-2014 for Cisco IOS R12.x. Currently, 5% (4 out of 86) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Cisco IOS R12.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Cisco IOS Network Address Translation Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 1 in 2014. 874 views.
Release Date:
2014-03-27
Secunia Advisory ID:
SA57630
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS AAA WEB_EXEC Command Authorisation Security Bypass Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2012. 1,924 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48614
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


patched Cisco IOS NAT SIP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 5 in 2012. 1,862 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48515
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2012. 1,913 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48605
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Smart Install Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 5 in 2012. 1,546 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48610
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multicast Source Discovery Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 5 in 2012. 1,680 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48630
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IGMPv3 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 10 in 2010. 2,912 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41551
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 10 in 2010. 3,166 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41549
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 10 in 2010. 2,864 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41513
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Implementation Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 10 in 2010. 5,105 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39068
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Cisco IOS IPsec IKE Packet Denial of Service
Vendor Patch. Secunia Advisory 5 of 10 in 2010. 3,450 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39057
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 10 in 2010. 3,329 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39067
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS TCP Options Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 10 in 2010. 3,403 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39078
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS NAT SCCP Fragmentation Denial of Service
Vendor Patch. Secunia Advisory 8 of 10 in 2010. 3,212 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39062
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Label Distribution Protocol Denial of Service
Vendor Patch. Secunia Advisory 9 of 10 in 2010. 3,523 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39065
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Unified Communications Manager Express Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 10 in 2010. 4,121 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39069
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 6 in 2009. 9,390 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36835
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, disclose sensitive information, or compromise a vulnerable device. [Read More]


patched Cisco Products TCP Implementation Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 6 in 2009. 5,069 views.
Release Date:
2009-09-09
Secunia Advisory ID:
SA36618
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Border Gateway Protocol Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 6 in 2009. 4,729 views.
Release Date:
2009-07-30
Secunia Advisory ID:
SA36046
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 6 in 2009. 11,215 views.
Release Date:
2009-03-26
Secunia Advisory ID:
SA34438
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Cisco IOS Cross-Site Scripting and Cross-Site Request Forgery
Unpatched. Secunia Advisory 5 of 6 in 2009. 7,292 views.
Release Date:
2009-02-06
Secunia Advisory ID:
SA33844
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Zloss has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


patched Cisco IOS HTTP Server Two Cross-Site Scripting Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 6 in 2009. 6,657 views.
Release Date:
2009-01-15
Secunia Advisory ID:
SA33461
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


unpatched Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
Unpatched. Secunia Advisory 1 of 7 in 2008. 9,584 views.
Release Date:
2008-11-06
Secunia Advisory ID:
SA32573
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS/CatOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 7 in 2008. 16,771 views.
Release Date:
2008-09-25
Secunia Advisory ID:
SA31990
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


patched Cisco Products DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 3 of 7 in 2008. 9,458 views.
Release Date:
2008-07-09
Secunia Advisory ID:
SA30979
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to poison the DNS cache. [Read More]


patched Cisco Products SNMPv3 Two Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 7 in 2008. 11,589 views.
Release Date:
2008-06-11
Secunia Advisory ID:
SA30612
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From local network
Short Description:
Two vulnerabilities have been reported in various Cisco products, which can be exploited by malicious people to spoof authenticated SNMPv3 packets. [Read More]


patched Cisco IOS SSH Server Denial of Service
Vendor Patch. Secunia Advisory 5 of 7 in 2008. 9,028 views.
Release Date:
2008-05-22
Secunia Advisory ID:
SA30322
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 7 in 2008. 17,241 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29507
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 7 in 2008. 11,197 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29559
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco Products EAP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 18 in 2007. 12,493 views.
Release Date:
2007-10-22
Secunia Advisory ID:
SA27329
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Line Printer Daemon Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 18 in 2007. 12,552 views.
Release Date:
2007-10-11
Secunia Advisory ID:
SA27169
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Andy Davis has reported a vulnerability in Cisco IOS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness
Vendor Patch. Secunia Advisory 3 of 18 in 2007. 11,477 views.
Release Date:
2007-09-27
Secunia Advisory ID:
SA26988
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


unpatched Cisco IOS Regular Expressions Denial of Service
Unpatched. Secunia Advisory 4 of 18 in 2007. 12,654 views.
Release Date:
2007-09-13
Secunia Advisory ID:
SA26798
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


partial Cisco IOS Next Hop Resolution Protocol Buffer Overflow
Partial Fix. Secunia Advisory 5 of 18 in 2007. 16,418 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26360
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


partial Cisco IOS Voice Service Multiple Protocol Handling Vulnerabilities
Partial Fix. Secunia Advisory 6 of 18 in 2007. 14,589 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26363
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


partial Cisco IOS Secure Copy Security Bypass Vulnerability
Partial Fix. Secunia Advisory 7 of 18 in 2007. 14,845 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26361
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


partial Cisco IOS IPv6 Routing Header Information Disclosure and Denial of Service
Partial Fix. Secunia Advisory 8 of 18 in 2007. 13,194 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26359
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS and IOS XR, which can be exploited by malicious people to potentially disclose sensitive information or to cause a DoS (Denial of Service). [Read More]


partial Cisco Products Crypto Library Denial of Service
Partial Fix. Secunia Advisory 9 of 18 in 2007. 13,203 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25364
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SSL Messages Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 18 in 2007. 12,763 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25361
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS FTP Server Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 18 in 2007. 16,235 views.
Release Date:
2007-05-10
Secunia Advisory ID:
SA25199
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


patched Cisco Products MPLS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 12 of 18 in 2007. 12,788 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24348
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco Products NAM SNMP Spoofing Vulnerability
Vendor Patch. Secunia Advisory 13 of 18 in 2007. 14,992 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24344
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Cisco IOS IPS Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 14 of 18 in 2007. 13,654 views.
Release Date:
2007-02-14
Secunia Advisory ID:
SA24142
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Packet Handling Reload Denial of Service
Vendor Patch. Secunia Advisory 15 of 18 in 2007. 17,480 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23978
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Cisco IOS VTP Denial of Service Vulnerability
Unpatched. Secunia Advisory 16 of 18 in 2007. 16,935 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23892
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
David Barroso Berrueta and Alfredo Andres Omella have reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 18 in 2007. 21,023 views.
Release Date:
2007-01-25
Secunia Advisory ID:
SA23867
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Cisco IOS DLSw Denial Of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 18 in 2007. 13,280 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23697
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS DOCSIS Community String Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2006. 14,269 views.
Release Date:
2006-09-21
Secunia Advisory ID:
SA21974
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Cisco IOS VTP Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 2 of 5 in 2006. 15,911 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21896
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. [Read More]


patched Cisco IOS GRE Decapsulation Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2006. 13,978 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21783
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS AAA Command Authentication Bypass Vulnerability
Vendor Workaround. Secunia Advisory 4 of 5 in 2006. 17,523 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18613
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Cisco IOS Stack Group Bidding Protocol Denial of Service
Vendor Patch. Secunia Advisory 5 of 5 in 2006. 12,715 views.
Release Date:
2006-01-19
Secunia Advisory ID:
SA18490
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS HTTP Server Script Insertion Vulnerability
Vendor Workaround. Secunia Advisory 1 of 13 in 2005. 20,841 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17780
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Hugo Vazquez Carames has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


patched Cisco ISAKMP IKE Message Processing Denial of Service
Vendor Patch. Secunia Advisory 2 of 13 in 2005. 27,852 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17553
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS System Timers Potential Arbitrary Code Execution
Vendor Patch. Secunia Advisory 3 of 13 in 2005. 38,854 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17413
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS Authentication Proxy for FTP/Telnet Buffer Overflow
Vendor Patch. Secunia Advisory 4 of 13 in 2005. 20,690 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16719
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Cisco IOS IPv6 Packet Handling Vulnerability
Vendor Patch. Secunia Advisory 5 of 13 in 2005. 22,266 views.
Release Date:
2005-07-29
Secunia Advisory ID:
SA16272
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Ciso IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable network device. [Read More]


patched Cisco IOS RADIUS Authentication Security Bypass
Vendor Patch. Secunia Advisory 6 of 13 in 2005. 14,406 views.
Release Date:
2005-06-30
Secunia Advisory ID:
SA15850
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to bypass RADIUS authentication. [Read More]


partial Cisco Various Products ICMP Message Handling Denial of Service
Partial Fix. Secunia Advisory 7 of 13 in 2005. 24,386 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14904
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fernando Gont has published an Internet-Draft describing how ICMP (Internet Control Message Protocol) can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that various Cisco products are affected. [Read More]


patched Cisco IOS Secure Shell Server Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 13 in 2005. 11,014 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14854
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IKE XAUTH Implementation Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 13 in 2005. 12,742 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14853
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS IPv6 Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 10 of 13 in 2005. 13,603 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14032
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS BGP Protocol Processing Denial of Service
Vendor Patch. Secunia Advisory 11 of 13 in 2005. 13,503 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14034
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS MPLS Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 12 of 13 in 2005. 12,325 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14031
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SCCP Control Protocol Message Denial of Service
Vendor Patch. Secunia Advisory 13 of 13 in 2005. 13,216 views.
Release Date:
2005-01-20
Secunia Advisory ID:
SA13913
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
SecureTest has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS DHCP Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 9 in 2004. 14,890 views.
Release Date:
2004-11-11
Secunia Advisory ID:
SA13148
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Telnet Service Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 2 of 9 in 2004. 18,447 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12395
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS OSPF Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 9 in 2004. 16,149 views.
Release Date:
2004-08-19
Secunia Advisory ID:
SA12322
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS BGP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 9 in 2004. 11,856 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11882
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been discovered in Cisco IOS, allowing malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS TCP Connection Reset Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2004. 25,799 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11440
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Paul A. Watson has published research about a somewhat known vulnerability in the TCP specification (RFC793), which can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that Cisco IOS is affected. [Read More]


patched Cisco IOS SNMP Request Processing Vulnerability
Vendor Patch. Secunia Advisory 6 of 9 in 2004. 10,743 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11442
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IPSec IKE Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2004. 10,871 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11324
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco Catalyst 6500 Series Switch and Cisco 7600 Series Internet Router, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco 6000/6500/7600 Series Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 8 of 9 in 2004. 14,320 views.
Release Date:
2004-02-04
Secunia Advisory ID:
SA10780
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Cisco has reported a vulnerability in Cisco 6000/6500/7600 network devices, which can be exploited by malicious people to cause a Denial of Service. [Read More]


patched Cisco Multiple Products H.323 Protocol Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 9 in 2004. 16,613 views.
Release Date:
2004-01-13
Secunia Advisory ID:
SA10610
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Multiple Cisco products contain vulnerabilities in the H.323 protocol implementation, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco OpenSSL Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 9 in 2003. 15,206 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9891
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has issued an advisory stating that various Cisco products are affected by the OpenSSL vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Possible Exposure of Memory
Vendor Patch. Secunia Advisory 2 of 9 in 2003. 11,817 views.
Release Date:
2003-08-01
Secunia Advisory ID:
SA9414
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to see parts of the memory. [Read More]


patched Cisco IOS Long HTTP Request Buffer Overflow
Vendor Patch. Secunia Advisory 3 of 9 in 2003. 13,353 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9397
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious users to crash a vulnerable device or execute arbitrary code. [Read More]


patched Cisco IOS User Enumeration
Vendor Workaround. Secunia Advisory 4 of 9 in 2003. 11,833 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9396
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to enumerate locally defined users. [Read More]


patched Cisco IOS IPv4 Packet Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2003. 12,150 views.
Release Date:
2003-07-17
Secunia Advisory ID:
SA9288
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) on vulnerable device. [Read More]


patched Cisco IOS SAA / RTR Denial of Service
Vendor Workaround. Secunia Advisory 6 of 9 in 2003. 12,455 views.
Release Date:
2003-05-15
Secunia Advisory ID:
SA8787
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A Denial of Service vulnerability has been identified in the SAA (Service Assurance Agent) previously called RTR (Response Time Reporter) service on Cisco IOS. [Read More]


patched Cisco IOS OSPF Neighbour Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2003. 10,737 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8130
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable network device. [Read More]


patched Cisco Session Initiation Protocol DoS
Vendor Patch. Secunia Advisory 8 of 9 in 2003. 11,006 views.
Release Date:
2003-02-22
Secunia Advisory ID:
SA8113
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has confirmed vulnerabilities in their SIP (Session Initiation Protocol) implementation in multiple products. These can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable device. [Read More]


patched Cisco IOS Route Manipulation via ICMP Redirects
Vendor Patch. Secunia Advisory 9 of 9 in 2003. 14,148 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8032
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS devices, which allows malicious people on a LAN (Local Area Network) to manipulate the device's routing table. [Read More]


patched Cisco IOS EIGRP Denial of Service
Vendor Workaround. Secunia Advisory 1 of 3 in 2002. 13,196 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7766
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco is vulnerable to a Denial of Service if EIGRP is enabled. [Read More]


patched Cisco IOS SSH vulnerabilities
Vendor Patch. Secunia Advisory 2 of 3 in 2002. 8,527 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7757
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has admitted that the SSH implementation used in IOS is vulnerable to some of the issues found by Rapid7. [Read More]


patched Cisco OSM Line Cards Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2002. 7,244 views.
Release Date:
2002-12-11
Secunia Advisory ID:
SA7686
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Cisco Catalyst 6500 and Cisco 7600 with OSM Line Cards running IOS from version 12.1(8)E to 12.1(13.4)E are vulnerable to a Denial of Service attack. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Cisco IOS R12.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+