CVE-2015-6279

The IPv6 snooping functionality in the first-hop security subsystem in Cisco IOS 12.2, 15.0, 15.1, 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.2SE, 3.3SE, 3.3XO, 3.4SG, 3.5E, and 3.6E before 3.6.3E; 3.7E before 3.7.2E; 3.9S and 3.10S before 3.10.6S; 3.11S before 3.11.4S; 3.12S and 3.13S before 3.13.3S; and 3.14S before 3.14.2S allows remote attackers to cause a denial of service (device reload) via a malformed ND packet with the Cryptographically Generated Address (CGA) option, aka Bug ID CSCuo04400.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:C
ciscoCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
ciscoios
12.2\(50\)sy
ciscoios
12.2\(50\)sy1
ciscoios
12.2\(50\)sy2
ciscoios
12.2\(50\)sy3
ciscoios
12.2\(50\)sy4
ciscoios
15.0\(1\)ex
ciscoios
15.0\(1\)sy
ciscoios
15.0\(1\)sy1
ciscoios
15.0\(1\)sy2
ciscoios
15.0\(1\)sy3
ciscoios
15.0\(1\)sy4
ciscoios
15.0\(1\)sy5
ciscoios
15.0\(1\)sy6
ciscoios
15.0\(1\)sy7
ciscoios
15.0\(1\)sy7a
ciscoios
15.0\(1\)sy8
ciscoios
15.0\(2\)ea2
ciscoios
15.0\(2\)ej
ciscoios
15.0\(2\)ej1
ciscoios
15.0\(2\)ez
ciscoios
15.0\(2\)se
ciscoios
15.0\(2\)se1
ciscoios
15.0\(2\)se2
ciscoios
15.0\(2\)se3
ciscoios
15.0\(2\)se4
ciscoios
15.0\(2\)se5
ciscoios
15.0\(2\)se6
ciscoios
15.0\(2\)se7
ciscoios
15.0\(2a\)ex5
ciscoios
15.1\(1\)sy
ciscoios
15.1\(1\)sy1
ciscoios
15.1\(1\)sy2
ciscoios
15.1\(1\)sy3
ciscoios
15.1\(1\)sy4
ciscoios
15.1\(1\)sy5
ciscoios
15.1\(2\)sg
ciscoios
15.1\(2\)sg1
ciscoios
15.1\(2\)sg2
ciscoios
15.1\(2\)sg3
ciscoios
15.1\(2\)sg4
ciscoios
15.1\(2\)sg5
ciscoios
15.1\(2\)sy
ciscoios
15.1\(2\)sy1
ciscoios
15.1\(2\)sy2
ciscoios
15.1\(2\)sy3
ciscoios
15.1\(2\)sy4
ciscoios
15.1\(2\)sy4a
ciscoios
15.2\(1\)e
ciscoios
15.2\(1\)e1
ciscoios
15.2\(1\)e2
ciscoios
15.2\(1\)e3
ciscoios
15.2\(1\)sy
ciscoios
15.2\(1\)sy0a
ciscoios
15.2\(2\)e
ciscoios
15.2\(2\)e1
ciscoios
15.2\(2\)e2
ciscoios
15.2\(2\)ea1
ciscoios
15.2\(2a\)e1
ciscoios
15.2\(3\)e
ciscoios
15.2\(3a\)e
ciscoios
15.2\(4\)s
ciscoios
15.2\(4\)s1
ciscoios
15.2\(4\)s2
ciscoios
15.2\(4\)s3
ciscoios
15.2\(4\)s3a
ciscoios
15.2\(4\)s4
ciscoios
15.2\(4\)s4a
ciscoios
15.2\(4\)s5
ciscoios
15.2\(4\)s6
ciscoios
15.2\(4\)s7
ciscoios
15.3\(1\)s
ciscoios
15.3\(1\)s2
ciscoios
15.3\(2\)s
ciscoios
15.3\(2\)s0a
ciscoios
15.3\(2\)s1
ciscoios
15.3\(2\)s2
ciscoios
15.3\(3\)s
ciscoios
15.3\(3\)s1
ciscoios
15.3\(3\)s2
ciscoios
15.3\(3\)s3
ciscoios
15.3\(3\)s4
ciscoios
15.4\(1\)s
ciscoios
15.4\(1\)s1
ciscoios
15.4\(1\)s2
ciscoios
15.4\(1\)s3
ciscoios
15.4\(2\)s
ciscoios
15.4\(2\)s1
ciscoios
15.4\(2\)s2
ciscoios
15.4\(2\)s3
ciscoios
15.4\(3\)s
ciscoios
15.4\(3\)s1
ciscoios
15.4\(3\)s2
ciscoios_xe
3.2se.0:se.0
ciscoios_xe
3.2se.1:se.1
ciscoios_xe
3.2se.2:se.2
ciscoios_xe
3.2se.3:se.3
ciscoios_xe
3.3se.0:se.0
ciscoios_xe
3.3se.1:se.1
ciscoios_xe
3.3se.2:se.2
ciscoios_xe
3.3se.3:se.3
ciscoios_xe
3.3se.4:se.4
ciscoios_xe
3.3se.5:se.5
ciscoios_xe
3.3xo.0:xo.0
ciscoios_xe
3.3xo.1:xo.1
ciscoios_xe
3.3xo.2:xo.2
ciscoios_xe
3.4sg.0:sg.0
ciscoios_xe
3.4sg.1:sg.1
ciscoios_xe
3.4sg.2:sg.2
ciscoios_xe
3.4sg.3:sg.3
ciscoios_xe
3.4sg.4:sg.4
ciscoios_xe
3.4sg.5:sg.5
ciscoios_xe
3.4sg.6:sg.6
ciscoios_xe
3.5e.0:e.0
ciscoios_xe
3.5e.1:e.1
ciscoios_xe
3.5e.2:e.2
ciscoios_xe
3.5e.3:e.3
ciscoios_xe
3.6e.0:e.0
ciscoios_xe
3.6e.0a:e.0a
ciscoios_xe
3.6e.0b:e.0b
ciscoios_xe
3.6e.1:e.1
ciscoios_xe
3.6e.2:e.2
ciscoios_xe
3.6e.2a:e.2a
ciscoios_xe
3.7e.0:e.0
ciscoios_xe
3.7e.1:e.1
ciscoios_xe
3.7e.2:e.2
ciscoios_xe
3.10s.0:s.0
ciscoios_xe
3.10s.0a:s.0a
ciscoios_xe
3.10s.01:s.01
ciscoios_xe
3.10s.1:s.1
ciscoios_xe
3.10s.2:s.2
ciscoios_xe
3.10s.3:s.3
ciscoios_xe
3.10s.4:s.4
ciscoios_xe
3.11s.0:s.0
ciscoios_xe
3.11s.1:s.1
ciscoios_xe
3.11s.2:s.2
ciscoios_xe
3.11s.3:s.3
ciscoios_xe
3.12s.0:s.0
ciscoios_xe
3.12s.1:s.1
ciscoios_xe
3.12s.2:s.2
𝑥
= Vulnerable software versions