Vulnerability Report: Cisco IOS R12.x

This vulnerability report for Cisco IOS R12.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Cisco IOS R12.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2015
2.2. Statistics for 2014
2.3. Statistics for 2013
2.4. Statistics for 2012
2.5. Statistics for 2011
2.6. Statistics for 2010
2.7. Statistics for 2009
2.8. Statistics for 2008
2.9. Statistics for 2007
2.10. Statistics for 2006
2.11. Statistics for 2005
2.12. Statistics for 2004
2.13. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2015
3.2. List for 2014
3.3. List for 2013
3.4. List for 2012
3.5. List for 2011
3.6. List for 2010
3.7. List for 2009
3.8. List for 2008
3.9. List for 2007
3.10. List for 2006
3.11. List for 2005
3.12. List for 2004
3.13. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Cisco

Product Link View Here (Link to external site)

Affected By 86 Secunia advisories
151 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 5% (4 of 86 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Cisco IOS R12.x, with all vendor patches applied, is rated Less critical .




86 Secunia Advisories in 2003-2015

Secunia has issued a total of 86 Secunia advisories in 2003-2015 for Cisco IOS R12.x. Currently, 5% (4 out of 86) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Cisco IOS R12.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Cisco IOS Network Address Translation Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 1 in 2014. 1,029 views.
Release Date:
2014-03-27
Secunia Advisory ID:
SA57630
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS AAA WEB_EXEC Command Authorisation Security Bypass Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2012. 2,109 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48614
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


patched Cisco IOS NAT SIP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 5 in 2012. 2,063 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48515
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2012. 2,096 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48605
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Smart Install Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 5 in 2012. 1,678 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48610
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multicast Source Discovery Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 5 in 2012. 1,826 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48630
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IGMPv3 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 10 in 2010. 3,087 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41551
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 10 in 2010. 3,328 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41549
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 10 in 2010. 3,001 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41513
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Implementation Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 10 in 2010. 5,320 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39068
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Cisco IOS IPsec IKE Packet Denial of Service
Vendor Patch. Secunia Advisory 5 of 10 in 2010. 3,669 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39057
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 10 in 2010. 3,564 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39067
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS TCP Options Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 10 in 2010. 3,620 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39078
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS NAT SCCP Fragmentation Denial of Service
Vendor Patch. Secunia Advisory 8 of 10 in 2010. 3,428 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39062
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Label Distribution Protocol Denial of Service
Vendor Patch. Secunia Advisory 9 of 10 in 2010. 3,720 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39065
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Unified Communications Manager Express Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 10 in 2010. 4,322 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39069
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 6 in 2009. 9,807 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36835
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, disclose sensitive information, or compromise a vulnerable device. [Read More]


patched Cisco Products TCP Implementation Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 6 in 2009. 5,192 views.
Release Date:
2009-09-09
Secunia Advisory ID:
SA36618
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Border Gateway Protocol Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 6 in 2009. 4,929 views.
Release Date:
2009-07-30
Secunia Advisory ID:
SA36046
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 6 in 2009. 11,637 views.
Release Date:
2009-03-26
Secunia Advisory ID:
SA34438
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Cisco IOS Cross-Site Scripting and Cross-Site Request Forgery
Unpatched. Secunia Advisory 5 of 6 in 2009. 7,469 views.
Release Date:
2009-02-06
Secunia Advisory ID:
SA33844
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Zloss has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


patched Cisco IOS HTTP Server Two Cross-Site Scripting Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 6 in 2009. 6,879 views.
Release Date:
2009-01-15
Secunia Advisory ID:
SA33461
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


unpatched Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
Unpatched. Secunia Advisory 1 of 7 in 2008. 9,812 views.
Release Date:
2008-11-06
Secunia Advisory ID:
SA32573
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS/CatOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 7 in 2008. 17,370 views.
Release Date:
2008-09-25
Secunia Advisory ID:
SA31990
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


patched Cisco Products DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 3 of 7 in 2008. 9,658 views.
Release Date:
2008-07-09
Secunia Advisory ID:
SA30979
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to poison the DNS cache. [Read More]


patched Cisco Products SNMPv3 Two Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 7 in 2008. 11,752 views.
Release Date:
2008-06-11
Secunia Advisory ID:
SA30612
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From local network
Short Description:
Two vulnerabilities have been reported in various Cisco products, which can be exploited by malicious people to spoof authenticated SNMPv3 packets. [Read More]


patched Cisco IOS SSH Server Denial of Service
Vendor Patch. Secunia Advisory 5 of 7 in 2008. 9,188 views.
Release Date:
2008-05-22
Secunia Advisory ID:
SA30322
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 7 in 2008. 17,507 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29507
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 7 in 2008. 11,401 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29559
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco Products EAP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 18 in 2007. 12,644 views.
Release Date:
2007-10-22
Secunia Advisory ID:
SA27329
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Line Printer Daemon Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 18 in 2007. 12,790 views.
Release Date:
2007-10-11
Secunia Advisory ID:
SA27169
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Andy Davis has reported a vulnerability in Cisco IOS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness
Vendor Patch. Secunia Advisory 3 of 18 in 2007. 11,643 views.
Release Date:
2007-09-27
Secunia Advisory ID:
SA26988
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


unpatched Cisco IOS Regular Expressions Denial of Service
Unpatched. Secunia Advisory 4 of 18 in 2007. 12,782 views.
Release Date:
2007-09-13
Secunia Advisory ID:
SA26798
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


partial Cisco IOS Next Hop Resolution Protocol Buffer Overflow
Partial Fix. Secunia Advisory 5 of 18 in 2007. 16,581 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26360
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


partial Cisco IOS Voice Service Multiple Protocol Handling Vulnerabilities
Partial Fix. Secunia Advisory 6 of 18 in 2007. 14,752 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26363
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


partial Cisco IOS Secure Copy Security Bypass Vulnerability
Partial Fix. Secunia Advisory 7 of 18 in 2007. 14,973 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26361
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


partial Cisco IOS IPv6 Routing Header Information Disclosure and Denial of Service
Partial Fix. Secunia Advisory 8 of 18 in 2007. 13,371 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26359
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS and IOS XR, which can be exploited by malicious people to potentially disclose sensitive information or to cause a DoS (Denial of Service). [Read More]


partial Cisco Products Crypto Library Denial of Service
Partial Fix. Secunia Advisory 9 of 18 in 2007. 13,361 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25364
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SSL Messages Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 18 in 2007. 12,936 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25361
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS FTP Server Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 18 in 2007. 16,463 views.
Release Date:
2007-05-10
Secunia Advisory ID:
SA25199
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


patched Cisco Products MPLS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 12 of 18 in 2007. 12,897 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24348
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco Products NAM SNMP Spoofing Vulnerability
Vendor Patch. Secunia Advisory 13 of 18 in 2007. 15,135 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24344
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Cisco IOS IPS Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 14 of 18 in 2007. 13,837 views.
Release Date:
2007-02-14
Secunia Advisory ID:
SA24142
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Packet Handling Reload Denial of Service
Vendor Patch. Secunia Advisory 15 of 18 in 2007. 17,680 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23978
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Cisco IOS VTP Denial of Service Vulnerability
Unpatched. Secunia Advisory 16 of 18 in 2007. 17,134 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23892
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
David Barroso Berrueta and Alfredo Andres Omella have reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 18 in 2007. 21,239 views.
Release Date:
2007-01-25
Secunia Advisory ID:
SA23867
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Cisco IOS DLSw Denial Of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 18 in 2007. 13,477 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23697
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS DOCSIS Community String Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2006. 14,388 views.
Release Date:
2006-09-21
Secunia Advisory ID:
SA21974
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Cisco IOS VTP Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 2 of 5 in 2006. 16,089 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21896
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. [Read More]


patched Cisco IOS GRE Decapsulation Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2006. 14,142 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21783
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS AAA Command Authentication Bypass Vulnerability
Vendor Workaround. Secunia Advisory 4 of 5 in 2006. 17,719 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18613
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Cisco IOS Stack Group Bidding Protocol Denial of Service
Vendor Patch. Secunia Advisory 5 of 5 in 2006. 12,875 views.
Release Date:
2006-01-19
Secunia Advisory ID:
SA18490
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS HTTP Server Script Insertion Vulnerability
Vendor Workaround. Secunia Advisory 1 of 13 in 2005. 21,051 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17780
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Hugo Vazquez Carames has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


patched Cisco ISAKMP IKE Message Processing Denial of Service
Vendor Patch. Secunia Advisory 2 of 13 in 2005. 28,091 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17553
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS System Timers Potential Arbitrary Code Execution
Vendor Patch. Secunia Advisory 3 of 13 in 2005. 38,996 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17413
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS Authentication Proxy for FTP/Telnet Buffer Overflow
Vendor Patch. Secunia Advisory 4 of 13 in 2005. 20,867 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16719
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Cisco IOS IPv6 Packet Handling Vulnerability
Vendor Patch. Secunia Advisory 5 of 13 in 2005. 22,447 views.
Release Date:
2005-07-29
Secunia Advisory ID:
SA16272
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Ciso IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable network device. [Read More]


patched Cisco IOS RADIUS Authentication Security Bypass
Vendor Patch. Secunia Advisory 6 of 13 in 2005. 14,506 views.
Release Date:
2005-06-30
Secunia Advisory ID:
SA15850
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to bypass RADIUS authentication. [Read More]


partial Cisco Various Products ICMP Message Handling Denial of Service
Partial Fix. Secunia Advisory 7 of 13 in 2005. 24,613 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14904
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fernando Gont has published an Internet-Draft describing how ICMP (Internet Control Message Protocol) can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that various Cisco products are affected. [Read More]


patched Cisco IOS Secure Shell Server Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 13 in 2005. 11,159 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14854
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IKE XAUTH Implementation Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 13 in 2005. 12,871 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14853
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS IPv6 Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 10 of 13 in 2005. 13,710 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14032
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS BGP Protocol Processing Denial of Service
Vendor Patch. Secunia Advisory 11 of 13 in 2005. 13,659 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14034
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS MPLS Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 12 of 13 in 2005. 12,450 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14031
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SCCP Control Protocol Message Denial of Service
Vendor Patch. Secunia Advisory 13 of 13 in 2005. 13,339 views.
Release Date:
2005-01-20
Secunia Advisory ID:
SA13913
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
SecureTest has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS DHCP Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 9 in 2004. 15,066 views.
Release Date:
2004-11-11
Secunia Advisory ID:
SA13148
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Telnet Service Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 2 of 9 in 2004. 18,564 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12395
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS OSPF Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 9 in 2004. 16,306 views.
Release Date:
2004-08-19
Secunia Advisory ID:
SA12322
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS BGP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 9 in 2004. 11,970 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11882
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been discovered in Cisco IOS, allowing malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS TCP Connection Reset Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2004. 26,142 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11440
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Paul A. Watson has published research about a somewhat known vulnerability in the TCP specification (RFC793), which can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that Cisco IOS is affected. [Read More]


patched Cisco IOS SNMP Request Processing Vulnerability
Vendor Patch. Secunia Advisory 6 of 9 in 2004. 10,813 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11442
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IPSec IKE Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2004. 10,932 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11324
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco Catalyst 6500 Series Switch and Cisco 7600 Series Internet Router, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco 6000/6500/7600 Series Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 8 of 9 in 2004. 14,462 views.
Release Date:
2004-02-04
Secunia Advisory ID:
SA10780
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Cisco has reported a vulnerability in Cisco 6000/6500/7600 network devices, which can be exploited by malicious people to cause a Denial of Service. [Read More]


patched Cisco Multiple Products H.323 Protocol Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 9 in 2004. 16,672 views.
Release Date:
2004-01-13
Secunia Advisory ID:
SA10610
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Multiple Cisco products contain vulnerabilities in the H.323 protocol implementation, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco OpenSSL Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 9 in 2003. 15,288 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9891
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has issued an advisory stating that various Cisco products are affected by the OpenSSL vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Possible Exposure of Memory
Vendor Patch. Secunia Advisory 2 of 9 in 2003. 11,904 views.
Release Date:
2003-08-01
Secunia Advisory ID:
SA9414
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to see parts of the memory. [Read More]


patched Cisco IOS Long HTTP Request Buffer Overflow
Vendor Patch. Secunia Advisory 3 of 9 in 2003. 13,490 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9397
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious users to crash a vulnerable device or execute arbitrary code. [Read More]


patched Cisco IOS User Enumeration
Vendor Workaround. Secunia Advisory 4 of 9 in 2003. 11,911 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9396
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to enumerate locally defined users. [Read More]


patched Cisco IOS IPv4 Packet Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2003. 12,280 views.
Release Date:
2003-07-17
Secunia Advisory ID:
SA9288
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) on vulnerable device. [Read More]


patched Cisco IOS SAA / RTR Denial of Service
Vendor Workaround. Secunia Advisory 6 of 9 in 2003. 12,534 views.
Release Date:
2003-05-15
Secunia Advisory ID:
SA8787
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A Denial of Service vulnerability has been identified in the SAA (Service Assurance Agent) previously called RTR (Response Time Reporter) service on Cisco IOS. [Read More]


patched Cisco IOS OSPF Neighbour Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2003. 10,819 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8130
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable network device. [Read More]


patched Cisco Session Initiation Protocol DoS
Vendor Patch. Secunia Advisory 8 of 9 in 2003. 11,052 views.
Release Date:
2003-02-22
Secunia Advisory ID:
SA8113
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has confirmed vulnerabilities in their SIP (Session Initiation Protocol) implementation in multiple products. These can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable device. [Read More]


patched Cisco IOS Route Manipulation via ICMP Redirects
Vendor Patch. Secunia Advisory 9 of 9 in 2003. 14,282 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8032
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS devices, which allows malicious people on a LAN (Local Area Network) to manipulate the device's routing table. [Read More]


patched Cisco IOS EIGRP Denial of Service
Vendor Workaround. Secunia Advisory 1 of 3 in 2002. 13,346 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7766
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco is vulnerable to a Denial of Service if EIGRP is enabled. [Read More]


patched Cisco IOS SSH vulnerabilities
Vendor Patch. Secunia Advisory 2 of 3 in 2002. 8,591 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7757
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has admitted that the SSH implementation used in IOS is vulnerable to some of the issues found by Rapid7. [Read More]


patched Cisco OSM Line Cards Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2002. 7,291 views.
Release Date:
2002-12-11
Secunia Advisory ID:
SA7686
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Cisco Catalyst 6500 and Cisco 7600 with OSM Line Cards running IOS from version 12.1(8)E to 12.1(13.4)E are vulnerable to a Denial of Service attack. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Cisco IOS R12.x 
No posts yet

-

You must be logged in to post a comment.