HIGH · 8.1

CVE-2016-6380

The DNS forwarder in Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.15 allows remote attackers to obtain sensitive information from process memory or cause a denial of serv...

Vulnerability Description

The DNS forwarder in Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.15 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (data corruption or device reload) via a crafted DNS response, aka Bug ID CSCup90532.

CVSS Score

8.1

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
CiscoIos12.0\(3\)t
CiscoIos Xe3.1.0s
CiscoIos Xe 3.2Ja3.2.0ja
CiscoIos Xe 3.3Sg3.3.0sg
CiscoIos Xe 3.3Xo3.3.0xo
CiscoIos Xe 3.4Sg3.4.0sg

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-6380?

CVE-2016-6380 is a vulnerability with a CVSS score of 8.1 (HIGH). The DNS forwarder in Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.15 allows remote attackers to obtain sensitive information from process memory or cause a denial of serv...

How severe is CVE-2016-6380?

CVE-2016-6380 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-6380?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco Ios Xe, Cisco Ios Xe 3.2Ja, Cisco Ios Xe 3.3Sg, Cisco Ios Xe 3.3Xo.