Search Results (Refine Search)
- Keyword (text search): cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:x64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-6297 |
The DHCPv6 server in Cisco IOS on ASR 9000 devices with software 5.2.0 Base allows remote attackers to cause a denial of service (process reset) via crafted packets, aka Bug ID CSCun36525. Published: September 18, 2015; 6:59:04 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-4284 |
The Concurrent Data Management Replication process in Cisco IOS XR 5.3.0 on ASR 9000 devices allows remote attackers to cause a denial of service (BGP process reload) via malformed BGPv4 packets, aka Bug ID CSCur70670. Published: July 22, 2015; 10:59:02 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-4205 |
Cisco IOS XR 5.3.1 on ASR 9000 devices allows remote attackers to cause a denial of service (NPU chip reset or line-card reload) by sending crafted IEEE 802.3x flow-control PAUSE frames on the local network, aka Bug ID CSCut19959. Published: June 23, 2015; 10:59:02 AM -0400 |
V3.x:(not available) V2.0: 5.7 MEDIUM |
CVE-2015-0695 |
Cisco IOS XR 4.3.4 through 5.3.0 on ASR 9000 devices, when uRPF, PBR, QoS, or an ACL is configured, does not properly handle bridge-group virtual interface (BVI) traffic, which allows remote attackers to cause a denial of service (chip and card hangs and reloads) by triggering use of a BVI interface for IPv4 packets, aka Bug ID CSCur62957. Published: April 16, 2015; 9:59:26 PM -0400 |
V3.x:(not available) V2.0: 7.8 HIGH |
CVE-2015-0694 |
Cisco ASR 9000 devices with software 5.3.0.BASE do not recognize that certain ACL entries have a single-host constraint, which allows remote attackers to bypass intended network-resource access restrictions by using an address that was not supposed to have been allowed, aka Bug ID CSCur28806. Published: April 10, 2015; 9:59:03 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2015-0672 |
The DHCPv4 server in Cisco IOS XR 5.2.2 on ASR 9000 devices allows remote attackers to cause a denial of service (service outage) via a flood of crafted DHCP packets, aka Bug ID CSCup67822. Published: March 26, 2015; 6:59:15 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-3396 |
Cisco IOS XR on ASR 9000 devices does not properly use compression for port-range and address-range encoding, which allows remote attackers to bypass intended Typhoon line-card ACL restrictions via transit traffic, aka Bug ID CSCup30133. Published: October 04, 2014; 9:55:13 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2014-3335 |
Cisco IOS XR 4.3(.2) and earlier on ASR 9000 devices does not properly perform NetFlow sampling of packets with multicast destination MAC addresses, which allows remote attackers to cause a denial of service (chip and card hangs) via a crafted packet, aka Bug ID CSCup77750. Published: August 26, 2014; 6:55:04 AM -0400 |
V3.x:(not available) V2.0: 4.6 MEDIUM |
CVE-2014-3322 |
Cisco IOS XR 4.3(.2) and earlier on ASR 9000 devices does not properly perform NetFlow sampling of IP packets, which allows remote attackers to cause a denial of service (chip and card hangs) via malformed (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCuo68417. Published: July 24, 2014; 10:55:07 AM -0400 |
V3.x:(not available) V2.0: 6.1 MEDIUM |
CVE-2014-3321 |
Cisco IOS XR 4.3.4 and earlier on ASR 9000 devices, when bridge-group virtual interface (BVI) routing is enabled, allows remote attackers to cause a denial of service (chip and card hangs) via a series of crafted MPLS packets, aka Bug ID CSCuo91149. Published: July 17, 2014; 8:55:04 PM -0400 |
V3.x:(not available) V2.0: 5.7 MEDIUM |
CVE-2014-3308 |
Cisco IOS XR on Trident line cards in ASR 9000 devices lacks a static punt policer, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted packets, aka Bug ID CSCun83985. Published: July 07, 2014; 7:01:30 AM -0400 |
V3.x:(not available) V2.0: 6.4 MEDIUM |
CVE-2014-2176 |
Cisco IOS XR 4.1.2 through 5.1.1 on ASR 9000 devices, when a Trident-based line card is used, allows remote attackers to cause a denial of service (NP chip and line card reload) via malformed IPv6 packets, aka Bug ID CSCun71928. Published: June 14, 2014; 7:18:55 AM -0400 |
V3.x:(not available) V2.0: 7.1 HIGH |