Vulnerabilities > Cisco > IOS XE > 16.4

DATE CVE VULNERABILITY TITLE RISK
2020-11-06 CVE-2020-3444 Unspecified vulnerability in Cisco IOS XE
A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters.
network
low complexity
cisco
5.0
2020-09-24 CVE-2020-3516 Improper Input Validation vulnerability in Cisco IOS XE
A vulnerability in the web server authentication of Cisco IOS XE Software could allow an authenticated, remote attacker to crash the web server on the device.
network
low complexity
cisco CWE-20
4.0
2020-02-19 CVE-2019-1950 Insecure Default Initialization of Resource vulnerability in Cisco IOS XE
A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, local attacker to gain unauthorized access to an affected device.
local
low complexity
cisco CWE-1188
8.4
2019-09-25 CVE-2019-12667 Cross-site Scripting vulnerability in Cisco IOS XE
A vulnerability in the web framework code of Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software.
network
cisco CWE-79
3.5
2019-09-25 CVE-2019-12666 Path Traversal vulnerability in Cisco IOS XE
A vulnerability in the Guest Shell of Cisco IOS XE Software could allow an authenticated, local attacker to perform directory traversal on the base Linux operating system of Cisco IOS XE Software.
local
low complexity
cisco CWE-22
7.2
2019-05-13 CVE-2019-1649 Improper Locking vulnerability in Cisco products
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component.
local
low complexity
cisco CWE-667
6.7
2018-04-19 CVE-2018-0257 Unspecified vulnerability in Cisco IOS XE
A vulnerability in Cisco IOS XE Software running on Cisco cBR Series Converged Broadband Routers could allow an unauthenticated, adjacent attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition.
low complexity
cisco
3.3