Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service Vulnerability
Cisco Security Advisory
Emergency Support:
+1 877 228 7302 (toll-free within North America)
+1 408 525 6532 (International direct-dial)
Non-emergency Support:
Email: psirt@cisco.com
Support requests that are received via e-mail are typically acknowledged within 48 hours.
Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.
More information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html
cisco-sa-20180328-dhcpr1
Final
1.1
1.0
2018-03-28T14:30:31
Initial public release.
1.1
2022-12-15T22:19:52
Updated exploitation information.
2018-03-28T16:00:00
2022-12-15T22:19:52
TVCE
A vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.
The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow condition on the affected device, which will cause the device to reload and result in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1"]
This advisory is part of the March 28, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 20 Cisco Security Advisories that describe 22 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-66682"].
This vulnerability affects Cisco devices that meet all the following criteria:
The device is running a vulnerable release of Cisco IOS Software or Cisco IOS XE Software. For information about which Cisco IOS and IOS XE Software releases are vulnerable, see the Fixed Software ["#fixed"] section of this advisory.
An interface of the device is configured as a DHCP relay agent.
The device or an interface of the device is configured to insert DHCP relay agent information (option 82 information) into DHCP packets.
The device or an interface of the device is configured to encapsulate option 82 information that it receives from other DHCP relay agents.
Assessing the DHCP Relay Agent Configuration
To determine whether any interfaces of a device are configured as a DHCP relay agent, administrators can log in to the device and use the show running-config | include ip helper-address command in the CLI. If the device is a Cisco cBR-8 Converged Broadband Router, administrators should instead use the show running-config | include cable helper-address command in the CLI.
If the command returns output, at least one interface of the device is configured as a DHCP relay agent.
The following example shows the output of the show running-config | include ip helper-address command for a device that is running Cisco IOS Software and has an interface that is configured to act as a DHCP relay agent and forward DHCP packets to the DHCP server address 10.10.10.1:
Router# show running-config | include ip helper-address
ip helper-address 10.10.10.1 Router#
If the show running-config | include ip helper-address command, or the show running-config | include cable helper-address command on a Cisco cBR-8 Router, does not return any output, none of the interfaces of the device are configured as a DHCP relay agent.
Assessing Support for Option 82 Insertion
To determine whether a device or an interface of a device is configured to insert option 82 information into DHCP packets, administrators can log in to the device and use the show running-config | include ip dhcp relay information option command in the CLI.
If the command output contains any of the following, the device is configured to insert option 82 information into DHCP packets:
ip dhcp relay information option-insert—Interface configuration, appears under the interface that is configured as a DHCP relay agent
ip dhcp relay information option server-id-override—Interface configuration, appears under the interface that is configured as a DHCP relay agent
ip dhcp relay information option—Global configuration
The following example shows the output of the show running-config | include ip dhcp relay information option command for a device that is running Cisco IOS Software and has an interface that is configured to both act as a DHCP relay agent and insert option 82 information into DHCP packets:
Router# show running-config | include ip dhcp relay information option
ip dhcp relay information option-insert Router#
If the show running-config | include ip dhcp relay information option command does not return any output, neither the device nor any interfaces of the device are configured to insert option 82 information into DHCP packets.
Assessing Support for Option 82 Encapsulation
To determine whether a device or an interface of a device is configured to encapsulate DHCP option 82 information that it receives from other DHCP relay agents, administrators can log in to the device and use the show running-config | include ip dhcp relay information policy.* encapsulate command in the CLI.
If the command output contains either of the following, the device is configured to encapsulate option 82 information that it receives:
ip dhcp relay information policy-action encapsulate—Interface configuration, appears under the interface that is configured as a DHCP relay agent
ip dhcp relay information policy encapsulate—Global configuration
The following example shows the output of the command for a device that is running Cisco IOS Software and is configured to both act as a DHCP relay agent and encapsulate option 82 information that it receives from other DHCP relay agents:
Router# show running-config | include ip dhcp relay information policy.* encapsulate
ip dhcp relay information policy encapsulate Router#
If the show running-config | include ip dhcp relay information policy.* encapsulate command does not return any output, neither the device nor any interfaces of the device are configured to encapsulate option 82 information.
Determining the Cisco IOS Software Release
To determine which Cisco IOS Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software. The banner also displays the installed image name in parentheses, followed by the Cisco IOS Software release number and release name. Some Cisco devices do not support the show version command or may provide different output.
The following example shows the output of the command for a device that is running Cisco IOS Software Release 15.5(2)T1 and has an installed image name of C2951-UNIVERSALK9-M:
Router> show version
Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2015 by Cisco Systems, Inc. Compiled Mon 22-Jun-15 09:32 by prod_rel_team . . .
For information about the naming and numbering conventions for Cisco IOS Software releases, see the Cisco IOS and NX-OS Software Reference Guide ["https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html"].
Determining the Cisco IOS XE Software Release
To determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text.
The following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M:
ios-xe-device# show version
Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2016 by Cisco Systems, Inc. Compiled Sun 27-Mar-16 21:47 by mcpre . . .
For information about the naming and numbering conventions for Cisco IOS XE Software releases, see the Cisco IOS and NX-OS Software Reference Guide ["https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html"].
No other Cisco products are currently known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect Cisco IOS XR Software or Cisco NX-OS Software.
To exploit this vulnerability, exploit packets would need to be received via an interface that meets all the configuration requirements outlined in the Vulnerable Products ["#vp"] section of this advisory.
There are no workarounds that address this vulnerability.
Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html ["https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"]
Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:
https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html ["https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"]
Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.
Cisco IOS and IOS XE Software
To help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides a tool, the Cisco IOS Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"], that identifies any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (“First Fixed”). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (“Combined First Fixed”).
Customers can use this tool to perform the following tasks:
Initiate a search by choosing one or more releases from a drop-down list or uploading a file from a local system for the tool to parse
Enter the output of the show version command for the tool to parse
Create a custom search by including all previously published Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication
To determine whether a release is affected by any published Cisco Security Advisory, use the Cisco IOS Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] on Cisco.com or enter a Cisco IOS Software or Cisco IOS XE Software release-for example, 15.1(4)M2 or 3.13.8S-in the following field:
For a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes ["https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"], Cisco IOS XE 3S Release Notes ["https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"], or Cisco IOS XE 3SG Release Notes ["https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"], depending on the Cisco IOS XE Software release.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
In March 2022, the Cisco Product Security Incident Response Team (PSIRT) became aware of additional attempted exploitation of this vulnerability in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate this vulnerability.
Cisco would like to thank Tenable for finding and reporting this vulnerability.
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1
Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-66682
Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
Cisco IOS 12.2(53)SE1
Cisco IOS 12.2(55)SE
Cisco IOS 12.2(46)SE
Cisco IOS 12.2(46)SE2
Cisco IOS 12.2(50)SE2
Cisco IOS 12.2(50)SE1
Cisco IOS 12.2(44)SE2
Cisco IOS 12.2(50)SE5
Cisco IOS 12.2(44)SE1
Cisco IOS 12.2(53)SE
Cisco IOS 12.2(44)SE4
Cisco IOS 12.2(55)SE3
Cisco IOS 12.2(55)SE2
Cisco IOS 12.2(44)SE
Cisco IOS 12.2(52)SE
Cisco IOS 12.2(58)SE
Cisco IOS 12.2(50)SE3
Cisco IOS 12.2(55)SE1
Cisco IOS 12.2(44)SE6
Cisco IOS 12.2(44)SE3
Cisco IOS 12.2(53)SE2
Cisco IOS 12.2(52)SE1
Cisco IOS 12.2(46)SE1
Cisco IOS 12.2(54)SE
Cisco IOS 12.2(44)SE5
Cisco IOS 12.2(50)SE4
Cisco IOS 12.2(50)SE
Cisco IOS 12.2(58)SE1
Cisco IOS 12.2(55)SE4
Cisco IOS 12.2(58)SE2
Cisco IOS 12.2(55)SE5
Cisco IOS 12.2(55)SE6
Cisco IOS 12.2(55)SE7
Cisco IOS 12.2(55)SE8
Cisco IOS 12.2(55)SE9
Cisco IOS 12.2(55)SE10
Cisco IOS 12.2(55)SE11
Cisco IOS 12.2(55)SE12
Cisco IOS 12.2(33)ZI
Cisco IOS 12.2(44)EX
Cisco IOS 12.2(53)EX
Cisco IOS 12.2(52)EX
Cisco IOS 12.2(44)EX1
Cisco IOS 12.2(55)EX
Cisco IOS 12.2(46)EX
Cisco IOS 12.2(52)EX1
Cisco IOS 12.2(55)EX1
Cisco IOS 12.2(55)EX2
Cisco IOS 12.2(55)EX3
Cisco IOS 12.2(58)EX
Cisco IOS 12.2(46)EY
Cisco IOS 12.2(55)EY
Cisco IOS 12.2(52)EY1
Cisco IOS 12.2(44)EY
Cisco IOS 12.2(52)EY
Cisco IOS 12.2(53)EY
Cisco IOS 12.2(52)EY2
Cisco IOS 12.2(52)EY1b
Cisco IOS 12.2(52)EY1c
Cisco IOS 12.2(58)EY
Cisco IOS 12.2(52)EY3
Cisco IOS 12.2(52)EY2a
Cisco IOS 12.2(58)EY1
Cisco IOS 12.2(52)EY4
Cisco IOS 12.2(52)EY3a
Cisco IOS 12.2(58)EY2
Cisco IOS 12.2(52)EY1a
Cisco IOS 12.2(58)EZ
Cisco IOS 12.2(53)EZ
Cisco IOS 12.2(55)EZ
Cisco IOS 12.2(60)EZ
Cisco IOS 12.2(60)EZ1
Cisco IOS 12.2(60)EZ2
Cisco IOS 12.2(60)EZ3
Cisco IOS 12.2(60)EZ4
Cisco IOS 12.2(60)EZ5
Cisco IOS 12.2(60)EZ6
Cisco IOS 12.2(60)EZ7
Cisco IOS 12.2(60)EZ8
Cisco IOS 12.2(60)EZ9
Cisco IOS 12.2(60)EZ10
Cisco IOS 12.2(60)EZ11
Cisco IOS 12.2(60)EZ12
Cisco IOS 12.2(50)SG3
Cisco IOS 12.2(53)SG
Cisco IOS 12.2(50)SG6
Cisco IOS 12.2(53)SG1
Cisco IOS 12.2(46)SG
Cisco IOS 12.2(53)SG2
Cisco IOS 12.2(50)SG5
Cisco IOS 12.2(53)SG3
Cisco IOS 12.2(50)SG8
Cisco IOS 12.2(50)SG2
Cisco IOS 12.2(54)SG1
Cisco IOS 12.2(50)SG1
Cisco IOS 12.2(52)SG
Cisco IOS 12.2(54)SG
Cisco IOS 12.2(50)SG
Cisco IOS 12.2(50)SG7
Cisco IOS 12.2(53)SG4
Cisco IOS 12.2(50)SG4
Cisco IOS 12.2(46)SG1
Cisco IOS 12.2(53)SG5
Cisco IOS 12.2(53)SG6
Cisco IOS 12.2(53)SG7
Cisco IOS 12.2(53)SG8
Cisco IOS 12.2(53)SG9
Cisco IOS 12.2(53)SG10
Cisco IOS 12.2(53)SG11
Cisco IOS 12.2(33)SRD7
Cisco IOS 12.2(33)SRD6
Cisco IOS 12.2(33)SRD4a
Cisco IOS 12.2(33)SRD2a
Cisco IOS 12.2(33)SRD4
Cisco IOS 12.2(33)SRD5
Cisco IOS 12.2(33)SRD3
Cisco IOS 12.2(33)SRD2
Cisco IOS 12.2(33)SRD1
Cisco IOS 12.2(33)SRD
Cisco IOS 12.2(33)SRD8
Cisco IOS 12.2(52)XO
Cisco IOS 12.2(54)XO
Cisco IOS 12.2(50)SQ2
Cisco IOS 12.2(50)SQ1
Cisco IOS 12.2(50)SQ
Cisco IOS 12.2(50)SQ3
Cisco IOS 12.2(50)SQ4
Cisco IOS 12.2(50)SQ5
Cisco IOS 12.2(50)SQ6
Cisco IOS 12.2(50)SQ7
Cisco IOS 12.2(33)SRE1
Cisco IOS 12.2(33)SRE2
Cisco IOS 12.2(33)SRE3
Cisco IOS 12.2(33)SRE4
Cisco IOS 12.2(33)SRE
Cisco IOS 12.2(33)SRE0a
Cisco IOS 12.2(33)SRE5
Cisco IOS 12.2(33)SRE6
Cisco IOS 12.2(33)SRE8
Cisco IOS 12.2(33)SRE7
Cisco IOS 12.2(33)SRE9
Cisco IOS 12.2(33)SRE7a
Cisco IOS 12.2(33)SRE10
Cisco IOS 12.2(33)SRE11
Cisco IOS 12.2(33)SRE9a
Cisco IOS 12.2(33)SRE12
Cisco IOS 12.2(33)SRE13
Cisco IOS 12.2(33)SRE14
Cisco IOS 12.2(33)SRE15
Cisco IOS 12.2(33)SRE15a
Cisco IOS 15.0(1)XO1
Cisco IOS 15.0(1)XO
Cisco IOS 15.0(2)XO
Cisco IOS 15.0(1)S2
Cisco IOS 15.0(1)S1
Cisco IOS 15.0(1)S
Cisco IOS 15.0(1)S3a
Cisco IOS 15.0(1)S4
Cisco IOS 15.0(1)S5
Cisco IOS 15.0(1)S4a
Cisco IOS 15.0(1)S6
Cisco IOS 12.2(33)MRA
Cisco IOS 12.2(33)MRB5
Cisco IOS 12.2(33)MRB2
Cisco IOS 12.2(33)MRB1
Cisco IOS 12.2(33)MRB4
Cisco IOS 12.2(33)MRB
Cisco IOS 12.2(33)MRB3
Cisco IOS 12.2(33)MRB6
Cisco IOS 15.2(1)S
Cisco IOS 15.2(2)S
Cisco IOS 15.2(1)S1
Cisco IOS 15.2(4)S
Cisco IOS 15.2(1)S2
Cisco IOS 15.2(2)S1
Cisco IOS 15.2(2)S2
Cisco IOS 15.2(2)S0a
Cisco IOS 15.2(2)S0c
Cisco IOS 15.2(2)S0d
Cisco IOS 15.2(4)S1
Cisco IOS 15.2(4)S4
Cisco IOS 15.2(4)S6
Cisco IOS 15.2(4)S2
Cisco IOS 15.2(4)S5
Cisco IOS 15.2(4)S3
Cisco IOS 15.2(4)S0c
Cisco IOS 15.2(4)S1c
Cisco IOS 15.2(4)S3a
Cisco IOS 15.2(4)S4a
Cisco IOS 15.2(4)S7
Cisco IOS 15.2(4)S8
Cisco IOS 15.0(1)EY
Cisco IOS 15.0(1)EY1
Cisco IOS 15.0(1)EY2
Cisco IOS 15.0(2)EY
Cisco IOS 15.0(2)EY1
Cisco IOS 15.0(2)EY2
Cisco IOS 15.0(2)EY3
Cisco IOS 12.2(54)WO
Cisco IOS 12.2(33)ZZ
Cisco IOS 15.1(2)S
Cisco IOS 15.1(1)S
Cisco IOS 15.1(1)S1
Cisco IOS 15.1(3)S
Cisco IOS 15.1(1)S2
Cisco IOS 15.1(2)S1
Cisco IOS 15.1(2)S2
Cisco IOS 15.1(3)S1
Cisco IOS 15.1(3)S0a
Cisco IOS 15.1(3)S2
Cisco IOS 15.1(3)S4
Cisco IOS 15.1(3)S3
Cisco IOS 15.1(3)S5
Cisco IOS 15.1(3)S6
Cisco IOS 15.1(3)S5a
Cisco IOS 15.1(3)S7
Cisco IOS 15.0(1)SE
Cisco IOS 15.0(2)SE
Cisco IOS 15.0(1)SE1
Cisco IOS 15.0(1)SE2
Cisco IOS 15.0(1)SE3
Cisco IOS 15.0(2)SE1
Cisco IOS 15.0(2)SE2
Cisco IOS 15.0(2)SE3
Cisco IOS 15.0(2)SE4
Cisco IOS 15.0(2)SE5
Cisco IOS 15.0(2)SE6
Cisco IOS 15.0(2)SE7
Cisco IOS 15.0(2)SE8
Cisco IOS 15.0(2)SE9
Cisco IOS 15.0(2a)SE9
Cisco IOS 15.0(2)SE10
Cisco IOS 15.0(2)SE11
Cisco IOS 15.0(2)SE10a
Cisco IOS 15.1(1)SG
Cisco IOS 15.1(2)SG
Cisco IOS 15.1(1)SG1
Cisco IOS 15.1(1)SG2
Cisco IOS 15.1(2)SG1
Cisco IOS 15.1(2)SG2
Cisco IOS 15.1(2)SG3
Cisco IOS 15.1(2)SG4
Cisco IOS 15.1(2)SG5
Cisco IOS 15.1(2)SG6
Cisco IOS 15.1(2)SG7
Cisco IOS 15.1(2)SG8
Cisco IOS 15.0(1)MR
Cisco IOS 15.0(2)MR
Cisco IOS 15.0(2)SG
Cisco IOS 15.0(2)SG1
Cisco IOS 15.0(2)SG2
Cisco IOS 15.0(2)SG3
Cisco IOS 15.0(2)SG4
Cisco IOS 15.0(2)SG5
Cisco IOS 15.0(2)SG6
Cisco IOS 15.0(2)SG7
Cisco IOS 15.0(2)SG8
Cisco IOS 15.0(2)SG9
Cisco IOS 15.0(2)SG10
Cisco IOS 15.0(2)SG11
Cisco IOS 15.0(2)SG11a
Cisco IOS 15.0(1)EX
Cisco IOS 15.0(2)EX
Cisco IOS 15.0(2)EX1
Cisco IOS 15.0(2)EX2
Cisco IOS 15.0(2)EX3
Cisco IOS 15.0(2)EX4
Cisco IOS 15.0(2)EX5
Cisco IOS 15.0(2)EX6
Cisco IOS 15.0(2)EX7
Cisco IOS 15.0(2)EX8
Cisco IOS 15.0(2a)EX5
Cisco IOS 15.0(2)EX10
Cisco IOS 15.0(2)EX11
Cisco IOS 15.0(2)EX13
Cisco IOS 15.0(2)EX12
Cisco IOS 15.3(1)S
Cisco IOS 15.3(2)S
Cisco IOS 15.3(3)S
Cisco IOS 15.3(1)S2
Cisco IOS 15.3(1)S1
Cisco IOS 15.3(2)S2
Cisco IOS 15.3(2)S1
Cisco IOS 15.3(1)S1e
Cisco IOS 15.3(3)S1
Cisco IOS 15.3(3)S2
Cisco IOS 15.3(3)S3
Cisco IOS 15.3(3)S6
Cisco IOS 15.3(3)S4
Cisco IOS 15.3(3)S1a
Cisco IOS 15.3(3)S5
Cisco IOS 15.3(3)S2a
Cisco IOS 15.3(3)S7
Cisco IOS 15.3(3)S8
Cisco IOS 15.3(3)S6a
Cisco IOS 15.3(3)S9
Cisco IOS 15.3(3)S10
Cisco IOS 15.3(3)S8a
Cisco IOS 15.0(2)EA
Cisco IOS 15.0(2)EA1
Cisco IOS 15.2(1)E
Cisco IOS 15.2(2)E
Cisco IOS 15.2(1)E1
Cisco IOS 15.2(3)E
Cisco IOS 15.2(1)E2
Cisco IOS 15.2(1)E3
Cisco IOS 15.2(2)E1
Cisco IOS 15.2(2b)E
Cisco IOS 15.2(4)E
Cisco IOS 15.2(3)E1
Cisco IOS 15.2(2)E2
Cisco IOS 15.2(2a)E1
Cisco IOS 15.2(2)E3
Cisco IOS 15.2(2a)E2
Cisco IOS 15.2(3)E2
Cisco IOS 15.2(3a)E
Cisco IOS 15.2(3)E3
Cisco IOS 15.2(3m)E2
Cisco IOS 15.2(4)E1
Cisco IOS 15.2(2)E4
Cisco IOS 15.2(2)E5
Cisco IOS 15.2(4)E2
Cisco IOS 15.2(4m)E1
Cisco IOS 15.2(3)E4
Cisco IOS 15.2(5)E
Cisco IOS 15.2(3m)E7
Cisco IOS 15.2(4)E3
Cisco IOS 15.2(2)E6
Cisco IOS 15.2(5a)E
Cisco IOS 15.2(5)E1
Cisco IOS 15.2(5b)E
Cisco IOS 15.2(4m)E3
Cisco IOS 15.2(3m)E8
Cisco IOS 15.2(2)E5a
Cisco IOS 15.2(5c)E
Cisco IOS 15.2(3)E5
Cisco IOS 15.2(2)E5b
Cisco IOS 15.2(4n)E2
Cisco IOS 15.2(4o)E2
Cisco IOS 15.2(5a)E1
Cisco IOS 15.2(4)E4
Cisco IOS 15.2(2)E7
Cisco IOS 15.2(5)E2
Cisco IOS 15.2(4p)E1
Cisco IOS 15.2(6)E
Cisco IOS 15.2(5)E2b
Cisco IOS 15.2(4)E5
Cisco IOS 15.2(5)E2c
Cisco IOS 15.2(2)E8
Cisco IOS 15.2(4m)E2
Cisco IOS 15.2(4o)E3
Cisco IOS 15.2(4q)E1
Cisco IOS 15.2(6)E0a
Cisco IOS 15.2(2)E7b
Cisco IOS 15.2(4)E5a
Cisco IOS 15.2(6)E0c
Cisco IOS 15.2(4s)E1
Cisco IOS 15.2(4s)E2
Cisco IOS 15.1(3)MRA
Cisco IOS 15.1(3)MRA1
Cisco IOS 15.1(3)MRA2
Cisco IOS 15.1(3)MRA3
Cisco IOS 15.1(3)MRA4
Cisco IOS 15.4(1)S
Cisco IOS 15.4(2)S
Cisco IOS 15.4(3)S
Cisco IOS 15.4(1)S1
Cisco IOS 15.4(1)S2
Cisco IOS 15.4(2)S1
Cisco IOS 15.4(1)S3
Cisco IOS 15.4(3)S1
Cisco IOS 15.4(2)S2
Cisco IOS 15.4(3)S2
Cisco IOS 15.4(3)S3
Cisco IOS 15.4(1)S4
Cisco IOS 15.4(2)S3
Cisco IOS 15.4(2)S4
Cisco IOS 15.4(3)S0d
Cisco IOS 15.4(3)S4
Cisco IOS 15.4(3)S0e
Cisco IOS 15.4(3)S5
Cisco IOS 15.4(3)S0f
Cisco IOS 15.4(3)S6
Cisco IOS 15.4(3)S7
Cisco IOS 15.4(3)S6a
Cisco IOS 15.4(3)S8
Cisco IOS 15.0(2)EZ
Cisco IOS 15.2(1)SC1a
Cisco IOS 15.2(2)SC
Cisco IOS 15.2(2)SC1
Cisco IOS 15.2(2)SC3
Cisco IOS 15.2(2)SC4
Cisco IOS 15.2(1)EY
Cisco IOS 15.0(2)EJ
Cisco IOS 15.0(2)EJ1
Cisco IOS 15.2(5)EX
Cisco IOS 15.2(1)SD1
Cisco IOS 15.2(1)SD2
Cisco IOS 15.2(1)SD3
Cisco IOS 15.2(1)SD4
Cisco IOS 15.2(1)SD6
Cisco IOS 15.2(1)SD6a
Cisco IOS 15.2(1)SD7
Cisco IOS 15.2(1)SD8
Cisco IOS 15.0(2)EK
Cisco IOS 15.0(2)EK1
Cisco IOS 15.5(1)S
Cisco IOS 15.5(2)S
Cisco IOS 15.5(1)S1
Cisco IOS 15.5(3)S
Cisco IOS 15.5(1)S2
Cisco IOS 15.5(1)S3
Cisco IOS 15.5(2)S1
Cisco IOS 15.5(2)S2
Cisco IOS 15.5(3)S1
Cisco IOS 15.5(3)S1a
Cisco IOS 15.5(2)S3
Cisco IOS 15.5(3)S2
Cisco IOS 15.5(3)S0a
Cisco IOS 15.5(3)S3
Cisco IOS 15.5(1)S4
Cisco IOS 15.5(2)S4
Cisco IOS 15.5(3)S4
Cisco IOS 15.5(3)S5
Cisco IOS 15.5(3)S6
Cisco IOS 15.5(3)S6a
Cisco IOS 15.5(3)S6b
Cisco IOS 15.1(3)SVG
Cisco IOS 15.1(3)SVG2
Cisco IOS 15.1(3)SVG3
Cisco IOS 15.1(3)SVG1b
Cisco IOS 15.1(3)SVG1c
Cisco IOS 15.1(3)SVG3a
Cisco IOS 15.1(3)SVG3b
Cisco IOS 15.1(3)SVG3c
Cisco IOS 15.1(3)SVG2a
Cisco IOS 15.1(3)SVG1a
Cisco IOS 15.2(2)EB
Cisco IOS 15.2(2)EB1
Cisco IOS 15.2(2)EB2
Cisco IOS 15.2(2)EA
Cisco IOS 15.2(2)EA1
Cisco IOS 15.2(2)EA2
Cisco IOS 15.2(3)EA
Cisco IOS 15.2(4)EA
Cisco IOS 15.2(4)EA1
Cisco IOS 15.2(2)EA3
Cisco IOS 15.2(4)EA3
Cisco IOS 15.2(5)EA
Cisco IOS 15.2(4)EA4
Cisco IOS 15.2(4)EA2
Cisco IOS 15.2(4)EA5
Cisco IOS 15.2(4)EA6
Cisco IOS 15.4(2)SN
Cisco IOS 15.4(2)SN1
Cisco IOS 15.4(3)SN1
Cisco IOS 15.4(3)SN1a
Cisco IOS 15.1(3)SVH
Cisco IOS 15.1(3)SVH2
Cisco IOS 15.1(3)SVH4
Cisco IOS 15.1(3)SVH4a
Cisco IOS 15.5(1)SN
Cisco IOS 15.5(1)SN1
Cisco IOS 15.5(2)SN
Cisco IOS 15.5(3)SN0a
Cisco IOS 15.5(3)SN
Cisco IOS 15.0(2)SQD
Cisco IOS 15.0(2)SQD1
Cisco IOS 15.0(2)SQD2
Cisco IOS 15.0(2)SQD3
Cisco IOS 15.0(2)SQD4
Cisco IOS 15.0(2)SQD5
Cisco IOS 15.0(2)SQD6
Cisco IOS 15.0(2)SQD7
Cisco IOS 15.6(1)S
Cisco IOS 15.6(2)S
Cisco IOS 15.6(2)S1
Cisco IOS 15.6(1)S1
Cisco IOS 15.6(1)S2
Cisco IOS 15.6(2)S2
Cisco IOS 15.6(1)S3
Cisco IOS 15.6(2)S3
Cisco IOS 15.6(1)S4
Cisco IOS 15.6(2)S4
Cisco IOS 15.1(3)SVI2
Cisco IOS 15.1(3)SVI1a
Cisco IOS 15.1(3)SVI2a
Cisco IOS 15.1(3)SVI3
Cisco IOS 15.1(3)SVI31a
Cisco IOS 15.1(3)SVI31b
Cisco IOS 15.1(3)SVI3b
Cisco IOS 15.1(3)SVI3c
Cisco IOS 15.6(2)SP
Cisco IOS 15.6(2)SP1
Cisco IOS 15.6(2)SP2
Cisco IOS 15.6(2)SP3
Cisco IOS 15.6(1)SN
Cisco IOS 15.6(1)SN1
Cisco IOS 15.6(2)SN
Cisco IOS 15.6(1)SN2
Cisco IOS 15.6(1)SN3
Cisco IOS 15.6(3)SN
Cisco IOS 15.6(4)SN
Cisco IOS 15.6(5)SN
Cisco IOS 15.6(6)SN
Cisco IOS 15.6(7)SN
Cisco IOS 15.6(7)SN1
Cisco IOS 15.6(7)SN2
Cisco IOS 15.6(7)SN3
Cisco IOS 15.1(3)SVJ
Cisco IOS 15.1(3)SVJ2
Cisco IOS 15.2(4)EC1
Cisco IOS 15.2(4)EC2
Cisco IOS 15.1(3)SVR1
Cisco IOS 15.1(3)SVR2
Cisco IOS 15.1(3)SVR3
Cisco IOS 15.1(3)SVR10
Cisco IOS 15.1(3)SVS
Cisco IOS 15.1(3)SVS1
Cisco IOS 15.1(3)SVT1
Cisco IOS 15.1(3)SVT2
Cisco IOS 15.1(3)SVT3
Cisco IOS 15.1(3)SVT4
Cisco IOS 15.1(3)SVU1
Cisco IOS 15.1(3)SVU10
Cisco IOS 15.1(3)SVU2
Cisco IOS 15.1(3)SVU11
Cisco IOS 15.1(3)SVU20
Cisco IOS 15.1(3)SVU21
Cisco IOS 15.1(3)SVV1
Cisco IOS 15.1(3)SVV2
Cisco IOS 15.1(3)SVV3
Cisco IOS 15.1(3)SVV4
Cisco IOS 15.1(3)SVW
Cisco IOS 15.1(3)SVW1
Cisco IOS 15.1(3)SVX
Cisco IOS 15.1(3)SVX1
Cisco IOS XE Software 3.2.0SG
Cisco IOS XE Software 3.2.1SG
Cisco IOS XE Software 3.2.2SG
Cisco IOS XE Software 3.2.3SG
Cisco IOS XE Software 3.2.4SG
Cisco IOS XE Software 3.2.5SG
Cisco IOS XE Software 3.2.6SG
Cisco IOS XE Software 3.2.7SG
Cisco IOS XE Software 3.2.8SG
Cisco IOS XE Software 3.2.9SG
Cisco IOS XE Software 3.2.10SG
Cisco IOS XE Software 3.2.11SG
Cisco IOS XE Software 3.7.0S
Cisco IOS XE Software 3.7.1S
Cisco IOS XE Software 3.7.2S
Cisco IOS XE Software 3.7.3S
Cisco IOS XE Software 3.7.4S
Cisco IOS XE Software 3.7.5S
Cisco IOS XE Software 3.7.6S
Cisco IOS XE Software 3.7.7S
Cisco IOS XE Software 3.7.8S
Cisco IOS XE Software 3.7.4aS
Cisco IOS XE Software 3.7.2tS
Cisco IOS XE Software 3.7.0xbS
Cisco IOS XE Software 3.7.0bS
Cisco IOS XE Software 3.7.0xaS
Cisco IOS XE Software 3.7.1aS
Cisco IOS XE Software 3.3.0SG
Cisco IOS XE Software 3.3.2SG
Cisco IOS XE Software 3.3.1SG
Cisco IOS XE Software 3.8.0S
Cisco IOS XE Software 3.8.1S
Cisco IOS XE Software 3.8.2S
Cisco IOS XE Software 3.9.1S
Cisco IOS XE Software 3.9.0S
Cisco IOS XE Software 3.9.2S
Cisco IOS XE Software 3.9.0xaS
Cisco IOS XE Software 3.9.1aS
Cisco IOS XE Software 3.9.0aS
Cisco IOS XE Software 3.2.0SE
Cisco IOS XE Software 3.2.1SE
Cisco IOS XE Software 3.2.2SE
Cisco IOS XE Software 3.2.3SE
Cisco IOS XE Software 3.3.0SE
Cisco IOS XE Software 3.3.1SE
Cisco IOS XE Software 3.3.2SE
Cisco IOS XE Software 3.3.3SE
Cisco IOS XE Software 3.3.4SE
Cisco IOS XE Software 3.3.5SE
Cisco IOS XE Software 3.3.0XO
Cisco IOS XE Software 3.3.1XO
Cisco IOS XE Software 3.3.2XO
Cisco IOS XE Software 3.4.0SG
Cisco IOS XE Software 3.4.2SG
Cisco IOS XE Software 3.4.1SG
Cisco IOS XE Software 3.4.3SG
Cisco IOS XE Software 3.4.4SG
Cisco IOS XE Software 3.4.5SG
Cisco IOS XE Software 3.4.6SG
Cisco IOS XE Software 3.4.7SG
Cisco IOS XE Software 3.4.8SG
Cisco IOS XE Software 3.5.0E
Cisco IOS XE Software 3.5.1E
Cisco IOS XE Software 3.5.2E
Cisco IOS XE Software 3.5.3E
Cisco IOS XE Software 3.10.0S
Cisco IOS XE Software 3.10.1S
Cisco IOS XE Software 3.10.2S
Cisco IOS XE Software 3.10.3S
Cisco IOS XE Software 3.10.4S
Cisco IOS XE Software 3.10.5S
Cisco IOS XE Software 3.10.6S
Cisco IOS XE Software 3.10.1xcS
Cisco IOS XE Software 3.10.2aS
Cisco IOS XE Software 3.10.2tS
Cisco IOS XE Software 3.10.7S
Cisco IOS XE Software 3.10.1xbS
Cisco IOS XE Software 3.10.8S
Cisco IOS XE Software 3.10.8aS
Cisco IOS XE Software 3.10.9S
Cisco IOS XE Software 3.10.10S
Cisco IOS XE Software 3.11.1S
Cisco IOS XE Software 3.11.2S
Cisco IOS XE Software 3.11.0S
Cisco IOS XE Software 3.11.3S
Cisco IOS XE Software 3.11.4S
Cisco IOS XE Software 3.12.0S
Cisco IOS XE Software 3.12.1S
Cisco IOS XE Software 3.12.2S
Cisco IOS XE Software 3.12.3S
Cisco IOS XE Software 3.12.0aS
Cisco IOS XE Software 3.12.4S
Cisco IOS XE Software 3.13.0S
Cisco IOS XE Software 3.13.1S
Cisco IOS XE Software 3.13.2S
Cisco IOS XE Software 3.13.3S
Cisco IOS XE Software 3.13.4S
Cisco IOS XE Software 3.13.5S
Cisco IOS XE Software 3.13.2aS
Cisco IOS XE Software 3.13.0aS
Cisco IOS XE Software 3.13.5aS
Cisco IOS XE Software 3.13.6S
Cisco IOS XE Software 3.13.7S
Cisco IOS XE Software 3.13.6aS
Cisco IOS XE Software 3.13.6bS
Cisco IOS XE Software 3.13.7aS
Cisco IOS XE Software 3.13.8S
Cisco IOS XE Software 3.6.0E
Cisco IOS XE Software 3.6.1E
Cisco IOS XE Software 3.6.0aE
Cisco IOS XE Software 3.6.0bE
Cisco IOS XE Software 3.6.2aE
Cisco IOS XE Software 3.6.2E
Cisco IOS XE Software 3.6.3E
Cisco IOS XE Software 3.6.4E
Cisco IOS XE Software 3.6.5E
Cisco IOS XE Software 3.6.6E
Cisco IOS XE Software 3.6.5aE
Cisco IOS XE Software 3.6.5bE
Cisco IOS XE Software 3.6.7E
Cisco IOS XE Software 3.6.8E
Cisco IOS XE Software 3.6.7aE
Cisco IOS XE Software 3.6.7bE
Cisco IOS XE Software 3.14.0S
Cisco IOS XE Software 3.14.1S
Cisco IOS XE Software 3.14.2S
Cisco IOS XE Software 3.14.3S
Cisco IOS XE Software 3.14.4S
Cisco IOS XE Software 3.15.0S
Cisco IOS XE Software 3.15.1S
Cisco IOS XE Software 3.15.2S
Cisco IOS XE Software 3.15.1cS
Cisco IOS XE Software 3.15.3S
Cisco IOS XE Software 3.15.4S
Cisco IOS XE Software 3.3.0SQ
Cisco IOS XE Software 3.3.1SQ
Cisco IOS XE Software 3.4.0SQ
Cisco IOS XE Software 3.4.1SQ
Cisco IOS XE Software 3.7.0E
Cisco IOS XE Software 3.7.1E
Cisco IOS XE Software 3.7.2E
Cisco IOS XE Software 3.7.3E
Cisco IOS XE Software 3.7.4E
Cisco IOS XE Software 3.7.5E
Cisco IOS XE Software 3.5.0SQ
Cisco IOS XE Software 3.5.1SQ
Cisco IOS XE Software 3.5.2SQ
Cisco IOS XE Software 3.5.3SQ
Cisco IOS XE Software 3.5.4SQ
Cisco IOS XE Software 3.5.5SQ
Cisco IOS XE Software 3.5.6SQ
Cisco IOS XE Software 3.5.7SQ
Cisco IOS XE Software 3.16.0S
Cisco IOS XE Software 3.16.1S
Cisco IOS XE Software 3.16.0aS
Cisco IOS XE Software 3.16.1aS
Cisco IOS XE Software 3.16.2S
Cisco IOS XE Software 3.16.2aS
Cisco IOS XE Software 3.16.0bS
Cisco IOS XE Software 3.16.0cS
Cisco IOS XE Software 3.16.3S
Cisco IOS XE Software 3.16.2bS
Cisco IOS XE Software 3.16.3aS
Cisco IOS XE Software 3.16.4S
Cisco IOS XE Software 3.16.4aS
Cisco IOS XE Software 3.16.4bS
Cisco IOS XE Software 3.16.4gS
Cisco IOS XE Software 3.16.5S
Cisco IOS XE Software 3.16.4cS
Cisco IOS XE Software 3.16.4dS
Cisco IOS XE Software 3.16.4eS
Cisco IOS XE Software 3.16.6S
Cisco IOS XE Software 3.16.5aS
Cisco IOS XE Software 3.16.5bS
Cisco IOS XE Software 3.16.6bS
Cisco IOS XE Software 3.17.0S
Cisco IOS XE Software 3.17.1S
Cisco IOS XE Software 3.17.2S
Cisco IOS XE Software 3.17.1aS
Cisco IOS XE Software 3.17.3S
Cisco IOS XE Software 3.17.4S
Cisco IOS XE Software 16.1.1
Cisco IOS XE Software 16.1.2
Cisco IOS XE Software 16.1.3
Cisco IOS XE Software 16.2.1
Cisco IOS XE Software 16.2.2
Cisco IOS XE Software 3.8.0E
Cisco IOS XE Software 3.8.1E
Cisco IOS XE Software 3.8.2E
Cisco IOS XE Software 3.8.3E
Cisco IOS XE Software 3.8.4E
Cisco IOS XE Software 3.8.5E
Cisco IOS XE Software 3.8.5aE
Cisco IOS XE Software 16.3.1
Cisco IOS XE Software 16.3.2
Cisco IOS XE Software 16.3.3
Cisco IOS XE Software 16.3.1a
Cisco IOS XE Software 16.3.4
Cisco IOS XE Software 16.3.5
Cisco IOS XE Software 16.3.5b
Cisco IOS XE Software 16.4.1
Cisco IOS XE Software 16.4.2
Cisco IOS XE Software 16.4.3
Cisco IOS XE Software 16.5.1
Cisco IOS XE Software 16.5.1a
Cisco IOS XE Software 16.5.1b
Cisco IOS XE Software 16.5.2
Cisco IOS XE Software 3.18.0aS
Cisco IOS XE Software 3.18.0S
Cisco IOS XE Software 3.18.1S
Cisco IOS XE Software 3.18.2S
Cisco IOS XE Software 3.18.3S
Cisco IOS XE Software 3.18.4S
Cisco IOS XE Software 3.18.0SP
Cisco IOS XE Software 3.18.1SP
Cisco IOS XE Software 3.18.1aSP
Cisco IOS XE Software 3.18.1gSP
Cisco IOS XE Software 3.18.1bSP
Cisco IOS XE Software 3.18.1cSP
Cisco IOS XE Software 3.18.2SP
Cisco IOS XE Software 3.18.1hSP
Cisco IOS XE Software 3.18.2aSP
Cisco IOS XE Software 3.18.1iSP
Cisco IOS XE Software 3.18.3SP
Cisco IOS XE Software 3.18.3aSP
Cisco IOS XE Software 3.18.3bSP
Cisco IOS XE Software 3.9.0E
Cisco IOS XE Software 3.9.1E
Cisco IOS XE Software 3.9.2E
Cisco IOS XE Software 3.9.2bE
Cisco IOS XE Software 16.6.1
Cisco IOS XE Software 16.6.2
Cisco IOS XE Software 16.7.1
Cisco IOS XE Software 16.7.1a
Cisco IOS XE Software 3.10.0E
Cisco IOS XE Software 3.10.0cE
Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service Vulnerability
CSCvg62730
CSCvg62730
Complete.
CVE-2018-0172
CVRFPID-103473
CVRFPID-103492
CVRFPID-103559
CVRFPID-103587
CVRFPID-103642
CVRFPID-103648
CVRFPID-103649
CVRFPID-103751
CVRFPID-103763
CVRFPID-103766
CVRFPID-103775
CVRFPID-103921
CVRFPID-103955
CVRFPID-103956
CVRFPID-103965
CVRFPID-104041
CVRFPID-104061
CVRFPID-104078
CVRFPID-104089
CVRFPID-104101
CVRFPID-104164
CVRFPID-104254
CVRFPID-104255
CVRFPID-104269
CVRFPID-104318
CVRFPID-104342
CVRFPID-104376
CVRFPID-104387
CVRFPID-104427
CVRFPID-104494
CVRFPID-104591
CVRFPID-104630
CVRFPID-104654
CVRFPID-104703
CVRFPID-104719
CVRFPID-104743
CVRFPID-104762
CVRFPID-104806
CVRFPID-104831
CVRFPID-104833
CVRFPID-104855
CVRFPID-104896
CVRFPID-104970
CVRFPID-104972
CVRFPID-105018
CVRFPID-105145
CVRFPID-105147
CVRFPID-105183
CVRFPID-105253
CVRFPID-105285
CVRFPID-105299
CVRFPID-105302
CVRFPID-105346
CVRFPID-105394
CVRFPID-105444
CVRFPID-105457
CVRFPID-105545
CVRFPID-105555
CVRFPID-105619
CVRFPID-105660
CVRFPID-105689
CVRFPID-105719
CVRFPID-105741
CVRFPID-105881
CVRFPID-105949
CVRFPID-105973
CVRFPID-105987
CVRFPID-106009
CVRFPID-106016
CVRFPID-106029
CVRFPID-106053
CVRFPID-106072
CVRFPID-106089
CVRFPID-106145
CVRFPID-106152
CVRFPID-106156
CVRFPID-106291
CVRFPID-106323
CVRFPID-106420
CVRFPID-106446
CVRFPID-106466
CVRFPID-106519
CVRFPID-106526
CVRFPID-106568
CVRFPID-106606
CVRFPID-106674
CVRFPID-106684
CVRFPID-106712
CVRFPID-106733
CVRFPID-106850
CVRFPID-106997
CVRFPID-107019
CVRFPID-107094
CVRFPID-107108
CVRFPID-107135
CVRFPID-107142
CVRFPID-107196
CVRFPID-107209
CVRFPID-107283
CVRFPID-107301
CVRFPID-107304
CVRFPID-107495
CVRFPID-107630
CVRFPID-107645
CVRFPID-107664
CVRFPID-107852
CVRFPID-107853
CVRFPID-107854
CVRFPID-107855
CVRFPID-107859
CVRFPID-107861
CVRFPID-108062
CVRFPID-108172
CVRFPID-108176
CVRFPID-108306
CVRFPID-108459
CVRFPID-108588
CVRFPID-108865
CVRFPID-108998
CVRFPID-109051
CVRFPID-109098
CVRFPID-109242
CVRFPID-109438
CVRFPID-109439
CVRFPID-109442
CVRFPID-109659
CVRFPID-109760
CVRFPID-109808
CVRFPID-110089
CVRFPID-110090
CVRFPID-110114
CVRFPID-110186
CVRFPID-111002
CVRFPID-111005
CVRFPID-111010
CVRFPID-111015
CVRFPID-111018
CVRFPID-111019
CVRFPID-111025
CVRFPID-111026
CVRFPID-111031
CVRFPID-111045
CVRFPID-111046
CVRFPID-111161
CVRFPID-111384
CVRFPID-111551
CVRFPID-111552
CVRFPID-111553
CVRFPID-111558
CVRFPID-111674
CVRFPID-111908
CVRFPID-112131
CVRFPID-112141
CVRFPID-112378
CVRFPID-112424
CVRFPID-112611
CVRFPID-113073
CVRFPID-113948
CVRFPID-113961
CVRFPID-113970
CVRFPID-114093
CVRFPID-114168
CVRFPID-114274
CVRFPID-114275
CVRFPID-114419
CVRFPID-114665
CVRFPID-115301
CVRFPID-115477
CVRFPID-115687
CVRFPID-115688
CVRFPID-115832
CVRFPID-115939
CVRFPID-115969
CVRFPID-116082
CVRFPID-116083
CVRFPID-116256
CVRFPID-116772
CVRFPID-117196
CVRFPID-117280
CVRFPID-117282
CVRFPID-117359
CVRFPID-117783
CVRFPID-117871
CVRFPID-183811
CVRFPID-183813
CVRFPID-183835
CVRFPID-183836
CVRFPID-183837
CVRFPID-183838
CVRFPID-183839
CVRFPID-184123
CVRFPID-184125
CVRFPID-184567
CVRFPID-184570
CVRFPID-184589
CVRFPID-184858
CVRFPID-184933
CVRFPID-185274
CVRFPID-185281
CVRFPID-185507
CVRFPID-187057
CVRFPID-187147
CVRFPID-187233
CVRFPID-187269
CVRFPID-187932
CVRFPID-187962
CVRFPID-188008
CVRFPID-188035
CVRFPID-188198
CVRFPID-188816
CVRFPID-189064
CVRFPID-189115
CVRFPID-189187
CVRFPID-189455
CVRFPID-189613
CVRFPID-189739
CVRFPID-190250
CVRFPID-190551
CVRFPID-190635
CVRFPID-190637
CVRFPID-190980
CVRFPID-190983
CVRFPID-191331
CVRFPID-191336
CVRFPID-191686
CVRFPID-191842
CVRFPID-191928
CVRFPID-191948
CVRFPID-192163
CVRFPID-192423
CVRFPID-192443
CVRFPID-192706
CVRFPID-192831
CVRFPID-192910
CVRFPID-192911
CVRFPID-192990
CVRFPID-193033
CVRFPID-193283
CVRFPID-193406
CVRFPID-193407
CVRFPID-193408
CVRFPID-193409
CVRFPID-193544
CVRFPID-194439
CVRFPID-194466
CVRFPID-194476
CVRFPID-194540
CVRFPID-194649
CVRFPID-194741
CVRFPID-194877
CVRFPID-194913
CVRFPID-195033
CVRFPID-195062
CVRFPID-195434
CVRFPID-195469
CVRFPID-195481
CVRFPID-195489
CVRFPID-195490
CVRFPID-195544
CVRFPID-195636
CVRFPID-195688
CVRFPID-195770
CVRFPID-195771
CVRFPID-195943
CVRFPID-196322
CVRFPID-196417
CVRFPID-196528
CVRFPID-197457
CVRFPID-197462
CVRFPID-197465
CVRFPID-197468
CVRFPID-197469
CVRFPID-197471
CVRFPID-197474
CVRFPID-197480
CVRFPID-197481
CVRFPID-197483
CVRFPID-197488
CVRFPID-198052
CVRFPID-198060
CVRFPID-198063
CVRFPID-198066
CVRFPID-198067
CVRFPID-198215
CVRFPID-198309
CVRFPID-198425
CVRFPID-198528
CVRFPID-198542
CVRFPID-200485
CVRFPID-200486
CVRFPID-200487
CVRFPID-200488
CVRFPID-200489
CVRFPID-200496
CVRFPID-200502
CVRFPID-201074
CVRFPID-201259
CVRFPID-201336
CVRFPID-201366
CVRFPID-201448
CVRFPID-201595
CVRFPID-201683
CVRFPID-202565
CVRFPID-202716
CVRFPID-204094
CVRFPID-204097
CVRFPID-204099
CVRFPID-204101
CVRFPID-204102
CVRFPID-204105
CVRFPID-204106
CVRFPID-204107
CVRFPID-204108
CVRFPID-204186
CVRFPID-204187
CVRFPID-204209
CVRFPID-204228
CVRFPID-204281
CVRFPID-204324
CVRFPID-204818
CVRFPID-204822
CVRFPID-204830
CVRFPID-204831
CVRFPID-204901
CVRFPID-205064
CVRFPID-205670
CVRFPID-205672
CVRFPID-205731
CVRFPID-209005
CVRFPID-209006
CVRFPID-209010
CVRFPID-209011
CVRFPID-209028
CVRFPID-209029
CVRFPID-209030
CVRFPID-209031
CVRFPID-209034
CVRFPID-209038
CVRFPID-209039
CVRFPID-209040
CVRFPID-209041
CVRFPID-209045
CVRFPID-209046
CVRFPID-209047
CVRFPID-209049
CVRFPID-209050
CVRFPID-209051
CVRFPID-209059
CVRFPID-209060
CVRFPID-209061
CVRFPID-209093
CVRFPID-209095
CVRFPID-209096
CVRFPID-209097
CVRFPID-209098
CVRFPID-209099
CVRFPID-209102
CVRFPID-209103
CVRFPID-209104
CVRFPID-209105
CVRFPID-209106
CVRFPID-209107
CVRFPID-209113
CVRFPID-209268
CVRFPID-209358
CVRFPID-209359
CVRFPID-209421
CVRFPID-209465
CVRFPID-209466
CVRFPID-209529
CVRFPID-209569
CVRFPID-209628
CVRFPID-209632
CVRFPID-209839
CVRFPID-209887
CVRFPID-209929
CVRFPID-210129
CVRFPID-210203
CVRFPID-210344
CVRFPID-210732
CVRFPID-210766
CVRFPID-210958
CVRFPID-211290
CVRFPID-211296
CVRFPID-211297
CVRFPID-211570
CVRFPID-211603
CVRFPID-211617
CVRFPID-211751
CVRFPID-211982
CVRFPID-211984
CVRFPID-212127
CVRFPID-212321
CVRFPID-212329
CVRFPID-212407
CVRFPID-212635
CVRFPID-213000
CVRFPID-213001
CVRFPID-213023
CVRFPID-213032
CVRFPID-213034
CVRFPID-213086
CVRFPID-213433
CVRFPID-213594
CVRFPID-213610
CVRFPID-213788
CVRFPID-213794
CVRFPID-214072
CVRFPID-214078
CVRFPID-214161
CVRFPID-214217
CVRFPID-214218
CVRFPID-214479
CVRFPID-214556
CVRFPID-214797
CVRFPID-214965
CVRFPID-214992
CVRFPID-216295
CVRFPID-216419
CVRFPID-216577
CVRFPID-216961
CVRFPID-217078
CVRFPID-217805
CVRFPID-218891
CVRFPID-218995
CVRFPID-218997
CVRFPID-220038
CVRFPID-220439
CVRFPID-220441
CVRFPID-220442
CVRFPID-220445
CVRFPID-220457
CVRFPID-220460
CVRFPID-220461
CVRFPID-220466
CVRFPID-220507
CVRFPID-220521
CVRFPID-220664
CVRFPID-220670
CVRFPID-220673
CVRFPID-220675
CVRFPID-220689
CVRFPID-221033
CVRFPID-221137
CVRFPID-222275
CVRFPID-222342
CVRFPID-222419
CVRFPID-222436
CVRFPID-222500
CVRFPID-222530
CVRFPID-222924
CVRFPID-222931
CVRFPID-223085
CVRFPID-223086
CVRFPID-223143
CVRFPID-224553
CVRFPID-224566
CVRFPID-224868
CVRFPID-225160
CVRFPID-225358
CVRFPID-225407
CVRFPID-225740
CVRFPID-226038
CVRFPID-226076
CVRFPID-226077
CVRFPID-226165
CVRFPID-227058
CVRFPID-227364
CVRFPID-227598
CVRFPID-227612
CVRFPID-227754
CVRFPID-227921
CVRFPID-227959
CVRFPID-228057
CVRFPID-228075
CVRFPID-228151
CVRFPID-228195
CVRFPID-228693
CVRFPID-228941
CVRFPID-230582
CVRFPID-230587
CVRFPID-230588
CVRFPID-230589
CVRFPID-230590
CVRFPID-230591
CVRFPID-230611
CVRFPID-230612
CVRFPID-230613
CVRFPID-230614
CVRFPID-230616
CVRFPID-230965
CVRFPID-230968
CVRFPID-230969
CVRFPID-230970
CVRFPID-230971
CVRFPID-230973
CVRFPID-230974
CVRFPID-230976
CVRFPID-230977
CVRFPID-230982
CVRFPID-230983
CVRFPID-230990
CVRFPID-231074
CVRFPID-231245
CVRFPID-232093
CVRFPID-236297
CVRFPID-241916
CVRFPID-250628
CVRFPID-254081
CVRFPID-262335
CVRFPID-262382
CVRFPID-275327
CVRFPID-277230
CVRFPID-277232
CVRFPID-277253
CVRFPID-278136
CVRFPID-279335
CVRFPID-279337
CVRFPID-280759
CVRFPID-282026
CVRFPID-283833
CVRFPID-284291
CVRFPID-284341
CVRFPID-284566
CVRFPID-284785
CVRFPID-286029
CVRFPID-286399
CVRFPID-286400
CVRFPID-286451
CVRFPID-286844
CVRFPID-286927
CVRFPID-286940
CVRFPID-289270
CVRFPID-289301
CVRFPID-289371
CVRFPID-290557
CVRFPID-290618
CVRFPID-112457
CVRFPID-112458
CVRFPID-184480
CVRFPID-184481
CVRFPID-188726
CVRFPID-194730
CVRFPID-194731
CVRFPID-194732
CVRFPID-194735
CVRFPID-194736
CVRFPID-194737
CVRFPID-194842
CVRFPID-194843
CVRFPID-196216
CVRFPID-196218
CVRFPID-196220
CVRFPID-196221
CVRFPID-196222
CVRFPID-196223
CVRFPID-196224
CVRFPID-196225
CVRFPID-196226
CVRFPID-196227
CVRFPID-196228
CVRFPID-196230
CVRFPID-196231
CVRFPID-196287
CVRFPID-196288
CVRFPID-196925
CVRFPID-197145
CVRFPID-198123
CVRFPID-198124
CVRFPID-198125
CVRFPID-200768
CVRFPID-200770
CVRFPID-200771
CVRFPID-201495
CVRFPID-202539
CVRFPID-202540
CVRFPID-202541
CVRFPID-202542
CVRFPID-202558
CVRFPID-203353
CVRFPID-206159
CVRFPID-206160
CVRFPID-206161
CVRFPID-206162
CVRFPID-206163
CVRFPID-206164
CVRFPID-206165
CVRFPID-206166
CVRFPID-206167
CVRFPID-206168
CVRFPID-206169
CVRFPID-206170
CVRFPID-206172
CVRFPID-206173
CVRFPID-206174
CVRFPID-206175
CVRFPID-206176
CVRFPID-206178
CVRFPID-206180
CVRFPID-206181
CVRFPID-206188
CVRFPID-206189
CVRFPID-206190
CVRFPID-206191
CVRFPID-206192
CVRFPID-206193
CVRFPID-206195
CVRFPID-206196
CVRFPID-206197
CVRFPID-206198
CVRFPID-206200
CVRFPID-206201
CVRFPID-206202
CVRFPID-206203
CVRFPID-206205
CVRFPID-206206
CVRFPID-206208
CVRFPID-206209
CVRFPID-206211
CVRFPID-210068
CVRFPID-210070
CVRFPID-210072
CVRFPID-210073
CVRFPID-210074
CVRFPID-210075
CVRFPID-210076
CVRFPID-210077
CVRFPID-210078
CVRFPID-210079
CVRFPID-210081
CVRFPID-210264
CVRFPID-212268
CVRFPID-212408
CVRFPID-212411
CVRFPID-212412
CVRFPID-212436
CVRFPID-212674
CVRFPID-213100
CVRFPID-213469
CVRFPID-213470
CVRFPID-213471
CVRFPID-213472
CVRFPID-213473
CVRFPID-213474
CVRFPID-213475
CVRFPID-213476
CVRFPID-213477
CVRFPID-213478
CVRFPID-213557
CVRFPID-213580
CVRFPID-213635
CVRFPID-213642
CVRFPID-213661
CVRFPID-213700
CVRFPID-213776
CVRFPID-213777
CVRFPID-213778
CVRFPID-213779
CVRFPID-213781
CVRFPID-213785
CVRFPID-213786
CVRFPID-213787
CVRFPID-213790
CVRFPID-213797
CVRFPID-213798
CVRFPID-213799
CVRFPID-213809
CVRFPID-213811
CVRFPID-213812
CVRFPID-213815
CVRFPID-213816
CVRFPID-213825
CVRFPID-213848
CVRFPID-213955
CVRFPID-213956
CVRFPID-213957
CVRFPID-213960
CVRFPID-214051
CVRFPID-214993
CVRFPID-217234
CVRFPID-217253
CVRFPID-217255
CVRFPID-217256
CVRFPID-217257
CVRFPID-217259
CVRFPID-217260
CVRFPID-217261
CVRFPID-217262
CVRFPID-217263
CVRFPID-217264
CVRFPID-217265
CVRFPID-217266
CVRFPID-217267
CVRFPID-217268
CVRFPID-217270
CVRFPID-217271
CVRFPID-217272
CVRFPID-217273
CVRFPID-217276
CVRFPID-217278
CVRFPID-217279
CVRFPID-217280
CVRFPID-217282
CVRFPID-217283
CVRFPID-218901
CVRFPID-218903
CVRFPID-220290
CVRFPID-220357
CVRFPID-220489
CVRFPID-220517
CVRFPID-220671
CVRFPID-220687
CVRFPID-220688
CVRFPID-220802
CVRFPID-220993
CVRFPID-221108
CVRFPID-221184
CVRFPID-221185
CVRFPID-222257
CVRFPID-222435
CVRFPID-222483
CVRFPID-222693
CVRFPID-222694
CVRFPID-222695
CVRFPID-222711
CVRFPID-222925
CVRFPID-222942
CVRFPID-223018
CVRFPID-223019
CVRFPID-223241
CVRFPID-223252
CVRFPID-224424
CVRFPID-224702
CVRFPID-224840
CVRFPID-225099
CVRFPID-225168
CVRFPID-225337
CVRFPID-225359
CVRFPID-225360
CVRFPID-225466
CVRFPID-225568
CVRFPID-225569
CVRFPID-225784
CVRFPID-225832
CVRFPID-226037
CVRFPID-226078
CVRFPID-226158
CVRFPID-226160
CVRFPID-226330
CVRFPID-226331
CVRFPID-226354
CVRFPID-227513
CVRFPID-227555
CVRFPID-227556
CVRFPID-227755
CVRFPID-227922
CVRFPID-227923
CVRFPID-228193
CVRFPID-228194
CVRFPID-228706
CVRFPID-229124
CVRFPID-229136
CVRFPID-229187
CVRFPID-230240
CVRFPID-230302
CVRFPID-230303
CVRFPID-230998
CVRFPID-231004
CVRFPID-231187
CVRFPID-231246
CVRFPID-231389
CVRFPID-231390
CVRFPID-231826
8.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
There are no workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1
Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service Vulnerability