Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Cisco IOS R12.x

This vulnerability report for Cisco IOS R12.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Cisco IOS R12.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Cisco

Product Link View Here (Link to external site)

Affected By 86 Secunia advisories
151 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 5% (4 of 86 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Cisco IOS R12.x, with all vendor patches applied, is rated Less critical .




86 Secunia Advisories in 2003-2014

Secunia has issued a total of 86 Secunia advisories in 2003-2014 for Cisco IOS R12.x. Currently, 5% (4 out of 86) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Cisco IOS R12.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Cisco IOS Network Address Translation Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 1 in 2014. 798 views.
Release Date:
2014-03-27
Secunia Advisory ID:
SA57630
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS AAA WEB_EXEC Command Authorisation Security Bypass Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2012. 1,832 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48614
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Cisco IOS NAT SIP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 5 in 2012. 1,789 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48515
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2012. 1,844 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48605
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Smart Install Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 5 in 2012. 1,498 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48610
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multicast Source Discovery Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 5 in 2012. 1,612 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48630
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 10 in 2010. 2,802 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41513
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IGMPv3 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 10 in 2010. 2,842 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41551
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SIP Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 10 in 2010. 3,093 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41549
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 10 in 2010. 3,239 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39067
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS TCP Options Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 10 in 2010. 3,328 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39078
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS NAT SCCP Fragmentation Denial of Service
Vendor Patch. Secunia Advisory 6 of 10 in 2010. 3,118 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39062
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Label Distribution Protocol Denial of Service
Vendor Patch. Secunia Advisory 7 of 10 in 2010. 3,416 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39065
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SIP Implementation Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 10 in 2010. 4,989 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39068
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Cisco IOS IPsec IKE Packet Denial of Service
Vendor Patch. Secunia Advisory 9 of 10 in 2010. 3,367 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39057
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Unified Communications Manager Express Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 10 in 2010. 4,021 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39069
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 6 in 2009. 9,233 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36835
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, disclose sensitive information, or compromise a vulnerable device. [Read More]


Cisco Products TCP Implementation Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 6 in 2009. 5,008 views.
Release Date:
2009-09-09
Secunia Advisory ID:
SA36618
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Border Gateway Protocol Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 6 in 2009. 4,633 views.
Release Date:
2009-07-30
Secunia Advisory ID:
SA36046
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 6 in 2009. 11,069 views.
Release Date:
2009-03-26
Secunia Advisory ID:
SA34438
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Cross-Site Scripting and Cross-Site Request Forgery
Unpatched. Secunia Advisory 5 of 6 in 2009. 7,203 views.
Release Date:
2009-02-06
Secunia Advisory ID:
SA33844
Solution Status:
Unpatched
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Zloss has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Cisco IOS HTTP Server Two Cross-Site Scripting Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 6 in 2009. 6,549 views.
Release Date:
2009-01-15
Secunia Advisory ID:
SA33461
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
Unpatched. Secunia Advisory 1 of 7 in 2008. 9,479 views.
Release Date:
2008-11-06
Secunia Advisory ID:
SA32573
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS/CatOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 7 in 2008. 16,498 views.
Release Date:
2008-09-25
Secunia Advisory ID:
SA31990
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Cisco Products DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 3 of 7 in 2008. 9,363 views.
Release Date:
2008-07-09
Secunia Advisory ID:
SA30979
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to poison the DNS cache. [Read More]


Cisco Products SNMPv3 Two Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 7 in 2008. 11,499 views.
Release Date:
2008-06-11
Secunia Advisory ID:
SA30612
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From local network
Short Description:
Two vulnerabilities have been reported in various Cisco products, which can be exploited by malicious people to spoof authenticated SNMPv3 packets. [Read More]


Cisco IOS SSH Server Denial of Service
Vendor Patch. Secunia Advisory 5 of 7 in 2008. 8,935 views.
Release Date:
2008-05-22
Secunia Advisory ID:
SA30322
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 7 in 2008. 17,123 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29507
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service). [Read More]


Cisco IOS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 7 in 2008. 11,121 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29559
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco Products EAP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 18 in 2007. 12,429 views.
Release Date:
2007-10-22
Secunia Advisory ID:
SA27329
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Line Printer Daemon Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 18 in 2007. 12,467 views.
Release Date:
2007-10-11
Secunia Advisory ID:
SA27169
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Andy Davis has reported a vulnerability in Cisco IOS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness
Vendor Patch. Secunia Advisory 3 of 18 in 2007. 11,400 views.
Release Date:
2007-09-27
Secunia Advisory ID:
SA26988
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS Regular Expressions Denial of Service
Unpatched. Secunia Advisory 4 of 18 in 2007. 12,590 views.
Release Date:
2007-09-13
Secunia Advisory ID:
SA26798
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Cisco IOS Next Hop Resolution Protocol Buffer Overflow
Partial Fix. Secunia Advisory 5 of 18 in 2007. 16,351 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26360
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Cisco IOS Voice Service Multiple Protocol Handling Vulnerabilities
Partial Fix. Secunia Advisory 6 of 18 in 2007. 14,516 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26363
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Cisco IOS Secure Copy Security Bypass Vulnerability
Partial Fix. Secunia Advisory 7 of 18 in 2007. 14,782 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26361
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Cisco IOS IPv6 Routing Header Information Disclosure and Denial of Service
Partial Fix. Secunia Advisory 8 of 18 in 2007. 13,123 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26359
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS and IOS XR, which can be exploited by malicious people to potentially disclose sensitive information or to cause a DoS (Denial of Service). [Read More]


Cisco Products Crypto Library Denial of Service
Partial Fix. Secunia Advisory 9 of 18 in 2007. 13,142 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25364
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SSL Messages Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 18 in 2007. 12,673 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25361
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS FTP Server Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 18 in 2007. 16,158 views.
Release Date:
2007-05-10
Secunia Advisory ID:
SA25199
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Cisco Products MPLS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 12 of 18 in 2007. 12,739 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24348
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco Products NAM SNMP Spoofing Vulnerability
Vendor Patch. Secunia Advisory 13 of 18 in 2007. 14,910 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24344
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Cisco IOS IPS Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 14 of 18 in 2007. 13,585 views.
Release Date:
2007-02-14
Secunia Advisory ID:
SA24142
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Cisco IOS SIP Packet Handling Reload Denial of Service
Vendor Patch. Secunia Advisory 15 of 18 in 2007. 17,371 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23978
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS VTP Denial of Service Vulnerability
Unpatched. Secunia Advisory 16 of 18 in 2007. 16,841 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23892
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
David Barroso Berrueta and Alfredo Andres Omella have reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 18 in 2007. 20,942 views.
Release Date:
2007-01-25
Secunia Advisory ID:
SA23867
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Cisco IOS DLSw Denial Of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 18 in 2007. 13,214 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23697
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS DOCSIS Community String Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2006. 14,200 views.
Release Date:
2006-09-21
Secunia Advisory ID:
SA21974
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Cisco IOS VTP Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 2 of 5 in 2006. 15,817 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21896
Solution Status:
Vendor Workaround
Criticality:
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. [Read More]


Cisco IOS GRE Decapsulation Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2006. 13,908 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21783
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS AAA Command Authentication Bypass Vulnerability
Vendor Workaround. Secunia Advisory 4 of 5 in 2006. 17,452 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18613
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Cisco IOS Stack Group Bidding Protocol Denial of Service
Vendor Patch. Secunia Advisory 5 of 5 in 2006. 12,652 views.
Release Date:
2006-01-19
Secunia Advisory ID:
SA18490
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS HTTP Server Script Insertion Vulnerability
Vendor Workaround. Secunia Advisory 1 of 13 in 2005. 20,741 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17780
Solution Status:
Vendor Workaround
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Hugo Vazquez Carames has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Cisco ISAKMP IKE Message Processing Denial of Service
Vendor Patch. Secunia Advisory 2 of 13 in 2005. 27,742 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17553
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS System Timers Potential Arbitrary Code Execution
Vendor Patch. Secunia Advisory 3 of 13 in 2005. 38,575 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17413
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS Authentication Proxy for FTP/Telnet Buffer Overflow
Vendor Patch. Secunia Advisory 4 of 13 in 2005. 20,621 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Cisco IOS IPv6 Packet Handling Vulnerability
Vendor Patch. Secunia Advisory 5 of 13 in 2005. 22,193 views.
Release Date:
2005-07-29
Secunia Advisory ID:
SA16272
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Ciso IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable network device. [Read More]


Cisco IOS RADIUS Authentication Security Bypass
Vendor Patch. Secunia Advisory 6 of 13 in 2005. 14,367 views.
Release Date:
2005-06-30
Secunia Advisory ID:
SA15850
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to bypass RADIUS authentication. [Read More]


Cisco Various Products ICMP Message Handling Denial of Service
Partial Fix. Secunia Advisory 7 of 13 in 2005. 24,277 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14904
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Fernando Gont has published an Internet-Draft describing how ICMP (Internet Control Message Protocol) can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that various Cisco products are affected. [Read More]


Cisco IOS Secure Shell Server Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 13 in 2005. 10,953 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IKE XAUTH Implementation Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 13 in 2005. 12,677 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14853
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS MPLS Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 10 of 13 in 2005. 12,266 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14031
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IPv6 Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 11 of 13 in 2005. 13,565 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14032
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS BGP Protocol Processing Denial of Service
Vendor Patch. Secunia Advisory 12 of 13 in 2005. 13,441 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14034
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SCCP Control Protocol Message Denial of Service
Vendor Patch. Secunia Advisory 13 of 13 in 2005. 13,141 views.
Release Date:
2005-01-20
Secunia Advisory ID:
SA13913
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
SecureTest has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS DHCP Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 9 in 2004. 14,814 views.
Release Date:
2004-11-11
Secunia Advisory ID:
SA13148
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Telnet Service Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 2 of 9 in 2004. 18,376 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12395
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS OSPF Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 9 in 2004. 16,068 views.
Release Date:
2004-08-19
Secunia Advisory ID:
SA12322
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS BGP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 9 in 2004. 11,821 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11882
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been discovered in Cisco IOS, allowing malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS TCP Connection Reset Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2004. 25,630 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11440
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Paul A. Watson has published research about a somewhat known vulnerability in the TCP specification (RFC793), which can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that Cisco IOS is affected. [Read More]


Cisco IOS SNMP Request Processing Vulnerability
Vendor Patch. Secunia Advisory 6 of 9 in 2004. 10,698 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11442
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IPSec IKE Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2004. 10,839 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11324
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco Catalyst 6500 Series Switch and Cisco 7600 Series Internet Router, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco 6000/6500/7600 Series Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 8 of 9 in 2004. 14,260 views.
Release Date:
2004-02-04
Secunia Advisory ID:
SA10780
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Cisco has reported a vulnerability in Cisco 6000/6500/7600 network devices, which can be exploited by malicious people to cause a Denial of Service. [Read More]


Cisco Multiple Products H.323 Protocol Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 9 in 2004. 16,585 views.
Release Date:
2004-01-13
Secunia Advisory ID:
SA10610
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Multiple Cisco products contain vulnerabilities in the H.323 protocol implementation, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco OpenSSL Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 9 in 2003. 15,170 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9891
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco has issued an advisory stating that various Cisco products are affected by the OpenSSL vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Possible Exposure of Memory
Vendor Patch. Secunia Advisory 2 of 9 in 2003. 11,770 views.
Release Date:
2003-08-01
Secunia Advisory ID:
SA9414
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to see parts of the memory. [Read More]


Cisco IOS Long HTTP Request Buffer Overflow
Vendor Patch. Secunia Advisory 3 of 9 in 2003. 13,299 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9397
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious users to crash a vulnerable device or execute arbitrary code. [Read More]


Cisco IOS User Enumeration
Vendor Workaround. Secunia Advisory 4 of 9 in 2003. 11,786 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9396
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to enumerate locally defined users. [Read More]


Cisco IOS IPv4 Packet Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2003. 12,097 views.
Release Date:
2003-07-17
Secunia Advisory ID:
SA9288
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) on vulnerable device. [Read More]


Cisco IOS SAA / RTR Denial of Service
Vendor Workaround. Secunia Advisory 6 of 9 in 2003. 12,426 views.
Release Date:
2003-05-15
Secunia Advisory ID:
SA8787
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A Denial of Service vulnerability has been identified in the SAA (Service Assurance Agent) previously called RTR (Response Time Reporter) service on Cisco IOS. [Read More]


Cisco IOS OSPF Neighbour Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2003. 10,682 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8130
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable network device. [Read More]


Cisco Session Initiation Protocol DoS
Vendor Patch. Secunia Advisory 8 of 9 in 2003. 10,991 views.
Release Date:
2003-02-22
Secunia Advisory ID:
SA8113
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco has confirmed vulnerabilities in their SIP (Session Initiation Protocol) implementation in multiple products. These can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable device. [Read More]


Cisco IOS Route Manipulation via ICMP Redirects
Vendor Patch. Secunia Advisory 9 of 9 in 2003. 14,101 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8032
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
DoS
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS devices, which allows malicious people on a LAN (Local Area Network) to manipulate the device's routing table. [Read More]


Cisco IOS EIGRP Denial of Service
Vendor Workaround. Secunia Advisory 1 of 3 in 2002. 13,115 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7766
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco is vulnerable to a Denial of Service if EIGRP is enabled. [Read More]


Cisco IOS SSH vulnerabilities
Vendor Patch. Secunia Advisory 2 of 3 in 2002. 8,508 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7757
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco has admitted that the SSH implementation used in IOS is vulnerable to some of the issues found by Rapid7. [Read More]


Cisco OSM Line Cards Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2002. 7,222 views.
Release Date:
2002-12-11
Secunia Advisory ID:
SA7686
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Cisco Catalyst 6500 and Cisco 7600 with OSM Line Cards running IOS from version 12.1(8)E to 12.1(13.4)E are vulnerable to a Denial of Service attack. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Cisco IOS R12.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer