Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Cisco IOS R12.x

This vulnerability report for Cisco IOS R12.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Cisco IOS R12.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Cisco

Product Link View Here (Link to external site)

Affected By 86 Secunia advisories
151 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 5% (4 of 86 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Cisco IOS R12.x, with all vendor patches applied, is rated Less critical .




86 Secunia Advisories in 2003-2014

Secunia has issued a total of 86 Secunia advisories in 2003-2014 for Cisco IOS R12.x. Currently, 5% (4 out of 86) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Cisco IOS R12.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Cisco IOS Network Address Translation Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 1 in 2014. 806 views.
Release Date:
2014-03-27
Secunia Advisory ID:
SA57630
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Smart Install Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2012. 1,500 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48610
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multicast Source Discovery Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 5 in 2012. 1,624 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48630
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS AAA WEB_EXEC Command Authorisation Security Bypass Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2012. 1,836 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48614
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Cisco IOS NAT SIP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 5 in 2012. 1,792 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48515
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 5 in 2012. 1,849 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48605
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IGMPv3 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 10 in 2010. 2,846 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41551
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SIP Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 10 in 2010. 3,097 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41549
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 10 in 2010. 2,804 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41513
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS NAT SCCP Fragmentation Denial of Service
Vendor Patch. Secunia Advisory 4 of 10 in 2010. 3,123 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39062
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Label Distribution Protocol Denial of Service
Vendor Patch. Secunia Advisory 5 of 10 in 2010. 3,420 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39065
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SIP Implementation Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 10 in 2010. 4,996 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39068
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Cisco IOS IPsec IKE Packet Denial of Service
Vendor Patch. Secunia Advisory 7 of 10 in 2010. 3,369 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39057
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 10 in 2010. 3,242 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39067
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS TCP Options Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 9 of 10 in 2010. 3,329 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39078
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Unified Communications Manager Express Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 10 in 2010. 4,022 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39069
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 6 in 2009. 9,237 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36835
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, disclose sensitive information, or compromise a vulnerable device. [Read More]


Cisco Products TCP Implementation Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 6 in 2009. 5,010 views.
Release Date:
2009-09-09
Secunia Advisory ID:
SA36618
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Border Gateway Protocol Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 6 in 2009. 4,639 views.
Release Date:
2009-07-30
Secunia Advisory ID:
SA36046
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 6 in 2009. 11,078 views.
Release Date:
2009-03-26
Secunia Advisory ID:
SA34438
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Cross-Site Scripting and Cross-Site Request Forgery
Unpatched. Secunia Advisory 5 of 6 in 2009. 7,211 views.
Release Date:
2009-02-06
Secunia Advisory ID:
SA33844
Solution Status:
Unpatched
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Zloss has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Cisco IOS HTTP Server Two Cross-Site Scripting Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 6 in 2009. 6,569 views.
Release Date:
2009-01-15
Secunia Advisory ID:
SA33461
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
Unpatched. Secunia Advisory 1 of 7 in 2008. 9,484 views.
Release Date:
2008-11-06
Secunia Advisory ID:
SA32573
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS/CatOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 7 in 2008. 16,519 views.
Release Date:
2008-09-25
Secunia Advisory ID:
SA31990
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


Cisco Products DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 3 of 7 in 2008. 9,366 views.
Release Date:
2008-07-09
Secunia Advisory ID:
SA30979
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to poison the DNS cache. [Read More]


Cisco Products SNMPv3 Two Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 7 in 2008. 11,505 views.
Release Date:
2008-06-11
Secunia Advisory ID:
SA30612
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From local network
Short Description:
Two vulnerabilities have been reported in various Cisco products, which can be exploited by malicious people to spoof authenticated SNMPv3 packets. [Read More]


Cisco IOS SSH Server Denial of Service
Vendor Patch. Secunia Advisory 5 of 7 in 2008. 8,944 views.
Release Date:
2008-05-22
Secunia Advisory ID:
SA30322
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 7 in 2008. 17,127 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29507
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service). [Read More]


Cisco IOS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 7 in 2008. 11,123 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29559
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco Products EAP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 18 in 2007. 12,441 views.
Release Date:
2007-10-22
Secunia Advisory ID:
SA27329
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Line Printer Daemon Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 18 in 2007. 12,474 views.
Release Date:
2007-10-11
Secunia Advisory ID:
SA27169
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Andy Davis has reported a vulnerability in Cisco IOS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness
Vendor Patch. Secunia Advisory 3 of 18 in 2007. 11,405 views.
Release Date:
2007-09-27
Secunia Advisory ID:
SA26988
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS Regular Expressions Denial of Service
Unpatched. Secunia Advisory 4 of 18 in 2007. 12,592 views.
Release Date:
2007-09-13
Secunia Advisory ID:
SA26798
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Cisco IOS Secure Copy Security Bypass Vulnerability
Partial Fix. Secunia Advisory 5 of 18 in 2007. 14,792 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26361
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Cisco IOS IPv6 Routing Header Information Disclosure and Denial of Service
Partial Fix. Secunia Advisory 6 of 18 in 2007. 13,128 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26359
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS and IOS XR, which can be exploited by malicious people to potentially disclose sensitive information or to cause a DoS (Denial of Service). [Read More]


Cisco IOS Next Hop Resolution Protocol Buffer Overflow
Partial Fix. Secunia Advisory 7 of 18 in 2007. 16,360 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26360
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Cisco IOS Voice Service Multiple Protocol Handling Vulnerabilities
Partial Fix. Secunia Advisory 8 of 18 in 2007. 14,529 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26363
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Cisco Products Crypto Library Denial of Service
Partial Fix. Secunia Advisory 9 of 18 in 2007. 13,147 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25364
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SSL Messages Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 18 in 2007. 12,681 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25361
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS FTP Server Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 18 in 2007. 16,163 views.
Release Date:
2007-05-10
Secunia Advisory ID:
SA25199
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Cisco Products MPLS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 12 of 18 in 2007. 12,743 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24348
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco Products NAM SNMP Spoofing Vulnerability
Vendor Patch. Secunia Advisory 13 of 18 in 2007. 14,914 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24344
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Cisco IOS IPS Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 14 of 18 in 2007. 13,593 views.
Release Date:
2007-02-14
Secunia Advisory ID:
SA24142
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Cisco IOS SIP Packet Handling Reload Denial of Service
Vendor Patch. Secunia Advisory 15 of 18 in 2007. 17,379 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23978
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS VTP Denial of Service Vulnerability
Unpatched. Secunia Advisory 16 of 18 in 2007. 16,852 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23892
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
David Barroso Berrueta and Alfredo Andres Omella have reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 18 in 2007. 20,950 views.
Release Date:
2007-01-25
Secunia Advisory ID:
SA23867
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Cisco IOS DLSw Denial Of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 18 in 2007. 13,217 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23697
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS DOCSIS Community String Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2006. 14,205 views.
Release Date:
2006-09-21
Secunia Advisory ID:
SA21974
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Cisco IOS VTP Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 2 of 5 in 2006. 15,821 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21896
Solution Status:
Vendor Workaround
Criticality:
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. [Read More]


Cisco IOS GRE Decapsulation Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2006. 13,918 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21783
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS AAA Command Authentication Bypass Vulnerability
Vendor Workaround. Secunia Advisory 4 of 5 in 2006. 17,456 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18613
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Cisco IOS Stack Group Bidding Protocol Denial of Service
Vendor Patch. Secunia Advisory 5 of 5 in 2006. 12,657 views.
Release Date:
2006-01-19
Secunia Advisory ID:
SA18490
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS HTTP Server Script Insertion Vulnerability
Vendor Workaround. Secunia Advisory 1 of 13 in 2005. 20,749 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17780
Solution Status:
Vendor Workaround
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Hugo Vazquez Carames has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Cisco ISAKMP IKE Message Processing Denial of Service
Vendor Patch. Secunia Advisory 2 of 13 in 2005. 27,756 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17553
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS System Timers Potential Arbitrary Code Execution
Vendor Patch. Secunia Advisory 3 of 13 in 2005. 38,616 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17413
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS Authentication Proxy for FTP/Telnet Buffer Overflow
Vendor Patch. Secunia Advisory 4 of 13 in 2005. 20,626 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Cisco IOS IPv6 Packet Handling Vulnerability
Vendor Patch. Secunia Advisory 5 of 13 in 2005. 22,195 views.
Release Date:
2005-07-29
Secunia Advisory ID:
SA16272
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Ciso IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable network device. [Read More]


Cisco IOS RADIUS Authentication Security Bypass
Vendor Patch. Secunia Advisory 6 of 13 in 2005. 14,368 views.
Release Date:
2005-06-30
Secunia Advisory ID:
SA15850
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to bypass RADIUS authentication. [Read More]


Cisco Various Products ICMP Message Handling Denial of Service
Partial Fix. Secunia Advisory 7 of 13 in 2005. 24,282 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14904
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Fernando Gont has published an Internet-Draft describing how ICMP (Internet Control Message Protocol) can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that various Cisco products are affected. [Read More]


Cisco IOS IKE XAUTH Implementation Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 13 in 2005. 12,680 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14853
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Cisco IOS Secure Shell Server Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 13 in 2005. 10,954 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS IPv6 Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 10 of 13 in 2005. 13,566 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14032
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS BGP Protocol Processing Denial of Service
Vendor Patch. Secunia Advisory 11 of 13 in 2005. 13,441 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14034
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS MPLS Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 12 of 13 in 2005. 12,270 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14031
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS SCCP Control Protocol Message Denial of Service
Vendor Patch. Secunia Advisory 13 of 13 in 2005. 13,154 views.
Release Date:
2005-01-20
Secunia Advisory ID:
SA13913
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
SecureTest has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS DHCP Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 9 in 2004. 14,817 views.
Release Date:
2004-11-11
Secunia Advisory ID:
SA13148
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Telnet Service Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 2 of 9 in 2004. 18,387 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12395
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS OSPF Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 9 in 2004. 16,077 views.
Release Date:
2004-08-19
Secunia Advisory ID:
SA12322
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS BGP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 9 in 2004. 11,823 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11882
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been discovered in Cisco IOS, allowing malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS TCP Connection Reset Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2004. 25,635 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11440
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Paul A. Watson has published research about a somewhat known vulnerability in the TCP specification (RFC793), which can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that Cisco IOS is affected. [Read More]


Cisco IOS SNMP Request Processing Vulnerability
Vendor Patch. Secunia Advisory 6 of 9 in 2004. 10,698 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11442
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IPSec IKE Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2004. 10,841 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11324
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco Catalyst 6500 Series Switch and Cisco 7600 Series Internet Router, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco 6000/6500/7600 Series Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 8 of 9 in 2004. 14,263 views.
Release Date:
2004-02-04
Secunia Advisory ID:
SA10780
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Cisco has reported a vulnerability in Cisco 6000/6500/7600 network devices, which can be exploited by malicious people to cause a Denial of Service. [Read More]


Cisco Multiple Products H.323 Protocol Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 9 in 2004. 16,586 views.
Release Date:
2004-01-13
Secunia Advisory ID:
SA10610
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Multiple Cisco products contain vulnerabilities in the H.323 protocol implementation, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco OpenSSL Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 9 in 2003. 15,171 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9891
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco has issued an advisory stating that various Cisco products are affected by the OpenSSL vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Cisco IOS Possible Exposure of Memory
Vendor Patch. Secunia Advisory 2 of 9 in 2003. 11,773 views.
Release Date:
2003-08-01
Secunia Advisory ID:
SA9414
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to see parts of the memory. [Read More]


Cisco IOS Long HTTP Request Buffer Overflow
Vendor Patch. Secunia Advisory 3 of 9 in 2003. 13,302 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9397
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious users to crash a vulnerable device or execute arbitrary code. [Read More]


Cisco IOS User Enumeration
Vendor Workaround. Secunia Advisory 4 of 9 in 2003. 11,788 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9396
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to enumerate locally defined users. [Read More]


Cisco IOS IPv4 Packet Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2003. 12,102 views.
Release Date:
2003-07-17
Secunia Advisory ID:
SA9288
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) on vulnerable device. [Read More]


Cisco IOS SAA / RTR Denial of Service
Vendor Workaround. Secunia Advisory 6 of 9 in 2003. 12,427 views.
Release Date:
2003-05-15
Secunia Advisory ID:
SA8787
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A Denial of Service vulnerability has been identified in the SAA (Service Assurance Agent) previously called RTR (Response Time Reporter) service on Cisco IOS. [Read More]


Cisco IOS OSPF Neighbour Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2003. 10,685 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8130
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable network device. [Read More]


Cisco Session Initiation Protocol DoS
Vendor Patch. Secunia Advisory 8 of 9 in 2003. 10,991 views.
Release Date:
2003-02-22
Secunia Advisory ID:
SA8113
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco has confirmed vulnerabilities in their SIP (Session Initiation Protocol) implementation in multiple products. These can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable device. [Read More]


Cisco IOS Route Manipulation via ICMP Redirects
Vendor Patch. Secunia Advisory 9 of 9 in 2003. 14,103 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8032
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
DoS
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS devices, which allows malicious people on a LAN (Local Area Network) to manipulate the device's routing table. [Read More]


Cisco IOS SSH vulnerabilities
Vendor Patch. Secunia Advisory 1 of 3 in 2002. 8,510 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7757
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco has admitted that the SSH implementation used in IOS is vulnerable to some of the issues found by Rapid7. [Read More]


Cisco IOS EIGRP Denial of Service
Vendor Workaround. Secunia Advisory 2 of 3 in 2002. 13,121 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7766
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Cisco is vulnerable to a Denial of Service if EIGRP is enabled. [Read More]


Cisco OSM Line Cards Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2002. 7,225 views.
Release Date:
2002-12-11
Secunia Advisory ID:
SA7686
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Cisco Catalyst 6500 and Cisco 7600 with OSM Line Cards running IOS from version 12.1(8)E to 12.1(13.4)E are vulnerable to a Denial of Service attack. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Cisco IOS R12.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer