Denial of service - CVE-2016-6380
Published: September 29, 2016 / Updated: October 7, 2016
Vulnerability identifier: #VU678
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-6380
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor:
Affected software:
Detailed vulnerability description
The vulnerability allows a remote user to cause the target system reload.
The weakness affects the processing of Common Industrial Protocol (CIP) message requests.By intercepting a DNS query from the target device and returnung a specially crafted DNS response message attackers can read certain files and trigger denial of service.
Successful exloitation of the vulnerability leads to the vulnerable system reload.
The weakness affects the processing of Common Industrial Protocol (CIP) message requests.By intercepting a DNS query from the target device and returnung a specially crafted DNS response message attackers can read certain files and trigger denial of service.
Successful exloitation of the vulnerability leads to the vulnerable system reload.
How to mitigate CVE-2016-6380
The advisory is available at:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns