Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2015-0641

Cisco IOS XE 2.x and 3.x before 3.9.0S, 3.10 before 3.10.0S, 3.11 before 3.11.0S, 3.12 before 3.12.0S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via crafted IPv6 packets, aka Bug ID CSCub68073.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 77.1%
CVSS Severity
CVSS v2 Score 7.8
Products affected by CVE-2015-0641
  • Cisco » Ios Xe » Version: 3.1s.0
    cpe:2.3:o:cisco:ios_xe:3.1s.0
  • Cisco » Ios Xe » Version: 3.1s.1
    cpe:2.3:o:cisco:ios_xe:3.1s.1
  • Cisco » Ios Xe » Version: 3.1s.2
    cpe:2.3:o:cisco:ios_xe:3.1s.2
  • Cisco » Ios Xe » Version: 3.1s.3
    cpe:2.3:o:cisco:ios_xe:3.1s.3
  • Cisco » Ios Xe » Version: 3.1s.4
    cpe:2.3:o:cisco:ios_xe:3.1s.4
  • Cisco » Ios Xe » Version: 3.1s.5
    cpe:2.3:o:cisco:ios_xe:3.1s.5
  • Cisco » Ios Xe » Version: 3.1s.6
    cpe:2.3:o:cisco:ios_xe:3.1s.6
  • Cisco » Ios Xe » Version: 3.2s.0
    cpe:2.3:o:cisco:ios_xe:3.2s.0
  • Cisco » Ios Xe » Version: 3.2s.1
    cpe:2.3:o:cisco:ios_xe:3.2s.1
  • Cisco » Ios Xe » Version: 3.2s.2
    cpe:2.3:o:cisco:ios_xe:3.2s.2
  • Cisco » Ios Xe » Version: 3.2s.3
    cpe:2.3:o:cisco:ios_xe:3.2s.3
  • Cisco » Ios Xe » Version: 3.3s.0
    cpe:2.3:o:cisco:ios_xe:3.3s.0
  • Cisco » Ios Xe » Version: 3.3s.1
    cpe:2.3:o:cisco:ios_xe:3.3s.1
  • Cisco » Ios Xe » Version: 3.3s.2
    cpe:2.3:o:cisco:ios_xe:3.3s.2
  • Cisco » Ios Xe » Version: 3.4s.0
    cpe:2.3:o:cisco:ios_xe:3.4s.0
  • Cisco » Ios Xe » Version: 3.4s.1
    cpe:2.3:o:cisco:ios_xe:3.4s.1
  • Cisco » Ios Xe » Version: 3.4s.2
    cpe:2.3:o:cisco:ios_xe:3.4s.2
  • Cisco » Ios Xe » Version: 3.4s.3
    cpe:2.3:o:cisco:ios_xe:3.4s.3
  • Cisco » Ios Xe » Version: 3.4s.4
    cpe:2.3:o:cisco:ios_xe:3.4s.4
  • Cisco » Ios Xe » Version: 3.4s.5
    cpe:2.3:o:cisco:ios_xe:3.4s.5
  • Cisco » Ios Xe » Version: 3.4s.6
    cpe:2.3:o:cisco:ios_xe:3.4s.6
  • Cisco » Ios Xe » Version: 3.5s
    cpe:2.3:o:cisco:ios_xe:3.5s
  • Cisco » Ios Xe » Version: 3.5s.0
    cpe:2.3:o:cisco:ios_xe:3.5s.0
  • Cisco » Ios Xe » Version: 3.5s.1
    cpe:2.3:o:cisco:ios_xe:3.5s.1
  • Cisco » Ios Xe » Version: 3.5s.2
    cpe:2.3:o:cisco:ios_xe:3.5s.2
  • Cisco » Ios Xe » Version: 3.6s
    cpe:2.3:o:cisco:ios_xe:3.6s
  • Cisco » Ios Xe » Version: 3.6s.0
    cpe:2.3:o:cisco:ios_xe:3.6s.0
  • Cisco » Ios Xe » Version: 3.6s.1
    cpe:2.3:o:cisco:ios_xe:3.6s.1
  • Cisco » Ios Xe » Version: 3.6s.2
    cpe:2.3:o:cisco:ios_xe:3.6s.2
  • Cisco » Ios Xe » Version: 3.7s
    cpe:2.3:o:cisco:ios_xe:3.7s
  • Cisco » Ios Xe » Version: 3.7s.0
    cpe:2.3:o:cisco:ios_xe:3.7s.0
  • Cisco » Ios Xe » Version: 3.7s.1
    cpe:2.3:o:cisco:ios_xe:3.7s.1
  • Cisco » Ios Xe » Version: 3.7s.2
    cpe:2.3:o:cisco:ios_xe:3.7s.2
  • Cisco » Ios Xe » Version: 3.7s.3
    cpe:2.3:o:cisco:ios_xe:3.7s.3
  • Cisco » Ios Xe » Version: 3.7s.4
    cpe:2.3:o:cisco:ios_xe:3.7s.4
  • Cisco » Ios Xe » Version: 3.7s.5
    cpe:2.3:o:cisco:ios_xe:3.7s.5
  • Cisco » Ios Xe » Version: 3.7s.6
    cpe:2.3:o:cisco:ios_xe:3.7s.6
  • Cisco » Ios Xe » Version: 3.7s.7
    cpe:2.3:o:cisco:ios_xe:3.7s.7
  • Cisco » Ios Xe » Version: 3.8s
    cpe:2.3:o:cisco:ios_xe:3.8s
  • Cisco » Ios Xe » Version: 3.8s.0
    cpe:2.3:o:cisco:ios_xe:3.8s.0
  • Cisco » Ios Xe » Version: 3.8s.1
    cpe:2.3:o:cisco:ios_xe:3.8s.1
  • Cisco » Ios Xe » Version: 3.8s.2
    cpe:2.3:o:cisco:ios_xe:3.8s.2


Contact Us

Shodan ® - All rights reserved