Vulnerability Report: Cisco IOS R12.x

This vulnerability report for Cisco IOS R12.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Cisco IOS R12.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2015
2.2. Statistics for 2014
2.3. Statistics for 2013
2.4. Statistics for 2012
2.5. Statistics for 2011
2.6. Statistics for 2010
2.7. Statistics for 2009
2.8. Statistics for 2008
2.9. Statistics for 2007
2.10. Statistics for 2006
2.11. Statistics for 2005
2.12. Statistics for 2004
2.13. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2015
3.2. List for 2014
3.3. List for 2013
3.4. List for 2012
3.5. List for 2011
3.6. List for 2010
3.7. List for 2009
3.8. List for 2008
3.9. List for 2007
3.10. List for 2006
3.11. List for 2005
3.12. List for 2004
3.13. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Cisco

Product Link View Here (Link to external site)

Affected By 86 Secunia advisories
151 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 5% (4 of 86 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Cisco IOS R12.x, with all vendor patches applied, is rated Less critical .




86 Secunia Advisories in 2003-2015

Secunia has issued a total of 86 Secunia advisories in 2003-2015 for Cisco IOS R12.x. Currently, 5% (4 out of 86) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Cisco IOS R12.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Cisco IOS Network Address Translation Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 1 in 2014. 992 views.
Release Date:
2014-03-27
Secunia Advisory ID:
SA57630
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS AAA WEB_EXEC Command Authorisation Security Bypass Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2012. 2,075 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48614
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


patched Cisco IOS NAT SIP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 5 in 2012. 2,020 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48515
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2012. 2,060 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48605
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Smart Install Unspecified Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 5 in 2012. 1,640 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48610
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multicast Source Discovery Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 5 in 2012. 1,797 views.
Release Date:
2012-03-29
Secunia Advisory ID:
SA48630
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IGMPv3 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 10 in 2010. 3,035 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41551
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 10 in 2010. 3,291 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41549
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 10 in 2010. 2,970 views.
Release Date:
2010-09-23
Secunia Advisory ID:
SA41513
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Implementation Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 10 in 2010. 5,272 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39068
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Cisco IOS IPsec IKE Packet Denial of Service
Vendor Patch. Secunia Advisory 5 of 10 in 2010. 3,621 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39057
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS H.323 Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 10 in 2010. 3,510 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39067
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS TCP Options Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 10 in 2010. 3,573 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39078
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS NAT SCCP Fragmentation Denial of Service
Vendor Patch. Secunia Advisory 8 of 10 in 2010. 3,390 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39062
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Label Distribution Protocol Denial of Service
Vendor Patch. Secunia Advisory 9 of 10 in 2010. 3,675 views.
Release Date:
2010-03-25
Secunia Advisory ID:
SA39065
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Unified Communications Manager Express Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 10 in 2010. 4,287 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39069
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 6 in 2009. 9,697 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36835
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, disclose sensitive information, or compromise a vulnerable device. [Read More]


patched Cisco Products TCP Implementation Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 6 in 2009. 5,155 views.
Release Date:
2009-09-09
Secunia Advisory ID:
SA36618
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in multiple Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Border Gateway Protocol Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 6 in 2009. 4,885 views.
Release Date:
2009-07-30
Secunia Advisory ID:
SA36046
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 6 in 2009. 11,531 views.
Release Date:
2009-03-26
Secunia Advisory ID:
SA34438
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Cisco IOS Cross-Site Scripting and Cross-Site Request Forgery
Unpatched. Secunia Advisory 5 of 6 in 2009. 7,430 views.
Release Date:
2009-02-06
Secunia Advisory ID:
SA33844
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Zloss has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


patched Cisco IOS HTTP Server Two Cross-Site Scripting Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 6 in 2009. 6,836 views.
Release Date:
2009-01-15
Secunia Advisory ID:
SA33461
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


unpatched Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
Unpatched. Secunia Advisory 1 of 7 in 2008. 9,761 views.
Release Date:
2008-11-06
Secunia Advisory ID:
SA32573
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS/CatOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 7 in 2008. 17,236 views.
Release Date:
2008-09-25
Secunia Advisory ID:
SA31990
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. [Read More]


patched Cisco Products DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 3 of 7 in 2008. 9,611 views.
Release Date:
2008-07-09
Secunia Advisory ID:
SA30979
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to poison the DNS cache. [Read More]


patched Cisco Products SNMPv3 Two Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 7 in 2008. 11,725 views.
Release Date:
2008-06-11
Secunia Advisory ID:
SA30612
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From local network
Short Description:
Two vulnerabilities have been reported in various Cisco products, which can be exploited by malicious people to spoof authenticated SNMPv3 packets. [Read More]


patched Cisco IOS SSH Server Denial of Service
Vendor Patch. Secunia Advisory 5 of 7 in 2008. 9,156 views.
Release Date:
2008-05-22
Secunia Advisory ID:
SA30322
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 7 in 2008. 17,451 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29507
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, or to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 7 in 2008. 11,351 views.
Release Date:
2008-03-27
Secunia Advisory ID:
SA29559
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco Products EAP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 18 in 2007. 12,603 views.
Release Date:
2007-10-22
Secunia Advisory ID:
SA27329
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Line Printer Daemon Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 18 in 2007. 12,727 views.
Release Date:
2007-10-11
Secunia Advisory ID:
SA27169
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Andy Davis has reported a vulnerability in Cisco IOS, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness
Vendor Patch. Secunia Advisory 3 of 18 in 2007. 11,593 views.
Release Date:
2007-09-27
Secunia Advisory ID:
SA26988
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


unpatched Cisco IOS Regular Expressions Denial of Service
Unpatched. Secunia Advisory 4 of 18 in 2007. 12,755 views.
Release Date:
2007-09-13
Secunia Advisory ID:
SA26798
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


partial Cisco IOS Next Hop Resolution Protocol Buffer Overflow
Partial Fix. Secunia Advisory 5 of 18 in 2007. 16,549 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26360
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


partial Cisco IOS Voice Service Multiple Protocol Handling Vulnerabilities
Partial Fix. Secunia Advisory 6 of 18 in 2007. 14,722 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26363
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


partial Cisco IOS Secure Copy Security Bypass Vulnerability
Partial Fix. Secunia Advisory 7 of 18 in 2007. 14,945 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26361
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


partial Cisco IOS IPv6 Routing Header Information Disclosure and Denial of Service
Partial Fix. Secunia Advisory 8 of 18 in 2007. 13,329 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26359
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS and IOS XR, which can be exploited by malicious people to potentially disclose sensitive information or to cause a DoS (Denial of Service). [Read More]


partial Cisco Products Crypto Library Denial of Service
Partial Fix. Secunia Advisory 9 of 18 in 2007. 13,327 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25364
Solution Status:
Partial Fix
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SSL Messages Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 18 in 2007. 12,906 views.
Release Date:
2007-05-23
Secunia Advisory ID:
SA25361
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS FTP Server Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 18 in 2007. 16,421 views.
Release Date:
2007-05-10
Secunia Advisory ID:
SA25199
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


patched Cisco Products MPLS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 12 of 18 in 2007. 12,870 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24348
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco Products NAM SNMP Spoofing Vulnerability
Vendor Patch. Secunia Advisory 13 of 18 in 2007. 15,109 views.
Release Date:
2007-03-01
Secunia Advisory ID:
SA24344
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Cisco IOS IPS Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 14 of 18 in 2007. 13,804 views.
Release Date:
2007-02-14
Secunia Advisory ID:
SA24142
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SIP Packet Handling Reload Denial of Service
Vendor Patch. Secunia Advisory 15 of 18 in 2007. 17,640 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23978
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


unpatched Cisco IOS VTP Denial of Service Vulnerability
Unpatched. Secunia Advisory 16 of 18 in 2007. 17,094 views.
Release Date:
2007-01-30
Secunia Advisory ID:
SA23892
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
David Barroso Berrueta and Alfredo Andres Omella have reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 18 in 2007. 21,192 views.
Release Date:
2007-01-25
Secunia Advisory ID:
SA23867
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Cisco IOS DLSw Denial Of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 18 in 2007. 13,431 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23697
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS DOCSIS Community String Vulnerability
Vendor Patch. Secunia Advisory 1 of 5 in 2006. 14,356 views.
Release Date:
2006-09-21
Secunia Advisory ID:
SA21974
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Cisco IOS VTP Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 2 of 5 in 2006. 16,059 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21896
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. [Read More]


patched Cisco IOS GRE Decapsulation Vulnerability
Vendor Patch. Secunia Advisory 3 of 5 in 2006. 14,105 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21783
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS AAA Command Authentication Bypass Vulnerability
Vendor Workaround. Secunia Advisory 4 of 5 in 2006. 17,670 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18613
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Cisco IOS Stack Group Bidding Protocol Denial of Service
Vendor Patch. Secunia Advisory 5 of 5 in 2006. 12,843 views.
Release Date:
2006-01-19
Secunia Advisory ID:
SA18490
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS HTTP Server Script Insertion Vulnerability
Vendor Workaround. Secunia Advisory 1 of 13 in 2005. 21,016 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17780
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Hugo Vazquez Carames has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


patched Cisco ISAKMP IKE Message Processing Denial of Service
Vendor Patch. Secunia Advisory 2 of 13 in 2005. 28,020 views.
Release Date:
2005-11-14
Secunia Advisory ID:
SA17553
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS System Timers Potential Arbitrary Code Execution
Vendor Patch. Secunia Advisory 3 of 13 in 2005. 38,958 views.
Release Date:
2005-11-03
Secunia Advisory ID:
SA17413
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS Authentication Proxy for FTP/Telnet Buffer Overflow
Vendor Patch. Secunia Advisory 4 of 13 in 2005. 20,832 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16719
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Cisco IOS IPv6 Packet Handling Vulnerability
Vendor Patch. Secunia Advisory 5 of 13 in 2005. 22,397 views.
Release Date:
2005-07-29
Secunia Advisory ID:
SA16272
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Ciso IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable network device. [Read More]


patched Cisco IOS RADIUS Authentication Security Bypass
Vendor Patch. Secunia Advisory 6 of 13 in 2005. 14,466 views.
Release Date:
2005-06-30
Secunia Advisory ID:
SA15850
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to bypass RADIUS authentication. [Read More]


partial Cisco Various Products ICMP Message Handling Denial of Service
Partial Fix. Secunia Advisory 7 of 13 in 2005. 24,558 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14904
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Fernando Gont has published an Internet-Draft describing how ICMP (Internet Control Message Protocol) can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that various Cisco products are affected. [Read More]


patched Cisco IOS Secure Shell Server Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 13 in 2005. 11,131 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14854
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS IKE XAUTH Implementation Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 13 in 2005. 12,846 views.
Release Date:
2005-04-07
Secunia Advisory ID:
SA14853
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Cisco IOS IPv6 Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 10 of 13 in 2005. 13,687 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14032
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS BGP Protocol Processing Denial of Service
Vendor Patch. Secunia Advisory 11 of 13 in 2005. 13,631 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14034
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS MPLS Packet Processing Denial of Service
Vendor Patch. Secunia Advisory 12 of 13 in 2005. 12,416 views.
Release Date:
2005-01-27
Secunia Advisory ID:
SA14031
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS SCCP Control Protocol Message Denial of Service
Vendor Patch. Secunia Advisory 13 of 13 in 2005. 13,314 views.
Release Date:
2005-01-20
Secunia Advisory ID:
SA13913
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
SecureTest has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS DHCP Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 9 in 2004. 15,021 views.
Release Date:
2004-11-11
Secunia Advisory ID:
SA13148
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Telnet Service Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 2 of 9 in 2004. 18,539 views.
Release Date:
2004-08-27
Secunia Advisory ID:
SA12395
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS OSPF Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 3 of 9 in 2004. 16,283 views.
Release Date:
2004-08-19
Secunia Advisory ID:
SA12322
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS BGP Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 9 in 2004. 11,947 views.
Release Date:
2004-06-16
Secunia Advisory ID:
SA11882
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been discovered in Cisco IOS, allowing malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS TCP Connection Reset Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2004. 26,077 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11440
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Paul A. Watson has published research about a somewhat known vulnerability in the TCP specification (RFC793), which can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that Cisco IOS is affected. [Read More]


patched Cisco IOS SNMP Request Processing Vulnerability
Vendor Patch. Secunia Advisory 6 of 9 in 2004. 10,801 views.
Release Date:
2004-04-21
Secunia Advisory ID:
SA11442
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been discovered in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IPSec IKE Packet Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2004. 10,915 views.
Release Date:
2004-04-09
Secunia Advisory ID:
SA11324
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Cisco Catalyst 6500 Series Switch and Cisco 7600 Series Internet Router, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco 6000/6500/7600 Series Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 8 of 9 in 2004. 14,433 views.
Release Date:
2004-02-04
Secunia Advisory ID:
SA10780
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Cisco has reported a vulnerability in Cisco 6000/6500/7600 network devices, which can be exploited by malicious people to cause a Denial of Service. [Read More]


patched Cisco Multiple Products H.323 Protocol Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 9 in 2004. 16,658 views.
Release Date:
2004-01-13
Secunia Advisory ID:
SA10610
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Multiple Cisco products contain vulnerabilities in the H.323 protocol implementation, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco OpenSSL Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 9 in 2003. 15,267 views.
Release Date:
2003-10-01
Secunia Advisory ID:
SA9891
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has issued an advisory stating that various Cisco products are affected by the OpenSSL vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Cisco IOS Possible Exposure of Memory
Vendor Patch. Secunia Advisory 2 of 9 in 2003. 11,888 views.
Release Date:
2003-08-01
Secunia Advisory ID:
SA9414
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to see parts of the memory. [Read More]


patched Cisco IOS Long HTTP Request Buffer Overflow
Vendor Patch. Secunia Advisory 3 of 9 in 2003. 13,461 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9397
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious users to crash a vulnerable device or execute arbitrary code. [Read More]


patched Cisco IOS User Enumeration
Vendor Workaround. Secunia Advisory 4 of 9 in 2003. 11,892 views.
Release Date:
2003-07-31
Secunia Advisory ID:
SA9396
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS allowing malicious people to enumerate locally defined users. [Read More]


patched Cisco IOS IPv4 Packet Processing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 9 in 2003. 12,244 views.
Release Date:
2003-07-17
Secunia Advisory ID:
SA9288
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) on vulnerable device. [Read More]


patched Cisco IOS SAA / RTR Denial of Service
Vendor Workaround. Secunia Advisory 6 of 9 in 2003. 12,522 views.
Release Date:
2003-05-15
Secunia Advisory ID:
SA8787
Solution Status:
Vendor Workaround
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A Denial of Service vulnerability has been identified in the SAA (Service Assurance Agent) previously called RTR (Response Time Reporter) service on Cisco IOS. [Read More]


patched Cisco IOS OSPF Neighbour Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2003. 10,804 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8130
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From local network
Short Description:
FX has reported a vulnerability in Cisco IOS, which can be exploited by malicious people to compromise a vulnerable network device. [Read More]


patched Cisco Session Initiation Protocol DoS
Vendor Patch. Secunia Advisory 8 of 9 in 2003. 11,045 views.
Release Date:
2003-02-22
Secunia Advisory ID:
SA8113
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has confirmed vulnerabilities in their SIP (Session Initiation Protocol) implementation in multiple products. These can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable device. [Read More]


patched Cisco IOS Route Manipulation via ICMP Redirects
Vendor Patch. Secunia Advisory 9 of 9 in 2003. 14,243 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8032
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
Where:
From local network
Short Description:
A vulnerability has been identified in Cisco IOS devices, which allows malicious people on a LAN (Local Area Network) to manipulate the device's routing table. [Read More]


patched Cisco IOS EIGRP Denial of Service
Vendor Workaround. Secunia Advisory 1 of 3 in 2002. 13,310 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7766
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco is vulnerable to a Denial of Service if EIGRP is enabled. [Read More]


patched Cisco IOS SSH vulnerabilities
Vendor Patch. Secunia Advisory 2 of 3 in 2002. 8,577 views.
Release Date:
2002-12-20
Secunia Advisory ID:
SA7757
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Cisco has admitted that the SSH implementation used in IOS is vulnerable to some of the issues found by Rapid7. [Read More]


patched Cisco OSM Line Cards Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2002. 7,286 views.
Release Date:
2002-12-11
Secunia Advisory ID:
SA7686
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Cisco Catalyst 6500 and Cisco 7600 with OSM Line Cards running IOS from version 12.1(8)E to 12.1(13.4)E are vulnerable to a Denial of Service attack. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Cisco IOS R12.x 
No posts yet

-

You must be logged in to post a comment.