{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Produits Cisco ex\u00e9cutant Cisco IOS ou IOS XE, voir sur le site du constructeur pour v\u00e9rifier si votre syst\u00e8me est vuln\u00e9rable (lien fourni dans la rubrique Documentation)","product":{"name":"IOS XE","vendor":{"name":"Cisco","scada":false}}},{"description":"Produits Cisco ex\u00e9cutant Cisco IOS avec WAAS Express configur\u00e9 sur une ou plusieurs interfaces sans fil, voir sur le site du constructeur pour v\u00e9rifier si votre syst\u00e8me est vuln\u00e9rable (lien fourni dans la rubrique Documentation)","product":{"name":"IOS","vendor":{"name":"Cisco","scada":false}}},{"description":"Produits Cisco ex\u00e9cutant Cisco IOS, IOS XE ou Cisco Unified Communications Manager Software, configur\u00e9s pour traiter les messages SIP , voir sur le site du constructeur pour v\u00e9rifier si votre syst\u00e8me est vuln\u00e9rable (lien fourni dans la rubrique Documentation)","product":{"name":"N/A","vendor":{"name":"Cisco","scada":false}}},{"description":"Routeurs Cisco Network Convergence System s\u00e9ries 6000 ex\u00e9cutant Cisco IOS XR","product":{"name":"IOS XR","vendor":{"name":"Cisco","scada":false}}},{"description":"Commutateurs Cisco Nexus s\u00e9ries 7000 et 7700 avec un module Gigabit Ethernet s\u00e9rie M1 ex\u00e9cutant Cisco NX-OS avec LISP configur\u00e9","product":{"name":"NX-OS","vendor":{"name":"Cisco","scada":false}}},{"description":"Commutateurs Cisco Catalyst s\u00e9ries 6500 et 6800 ex\u00e9cutant Cisco IOS avec LISP configur\u00e9","product":{"name":"IOS","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-1344","url":"https://www.cve.org/CVERecord?id=CVE-2016-1344"},{"name":"CVE-2016-1366","url":"https://www.cve.org/CVERecord?id=CVE-2016-1366"},{"name":"CVE-2016-1350","url":"https://www.cve.org/CVERecord?id=CVE-2016-1350"},{"name":"CVE-2016-1349","url":"https://www.cve.org/CVERecord?id=CVE-2016-1349"},{"name":"CVE-2016-1348","url":"https://www.cve.org/CVERecord?id=CVE-2016-1348"},{"name":"CVE-2016-1347","url":"https://www.cve.org/CVERecord?id=CVE-2016-1347"},{"name":"CVE-2016-1351","url":"https://www.cve.org/CVERecord?id=CVE-2016-1351"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-sip du 23 mars    2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-smi du 23 mars    2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-l4f du 23 mars    2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-dhcpv6 du 23    mars 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-lisp du 23    mars 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-ncs du 23 mars    2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ncs"},{"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-ios-ikev2 du    23 mars 2016","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2"}],"reference":"CERTFR-2016-AVI-107","revisions":[{"description":"version initiale.","revision_date":"2016-03-24T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Cisco</span>. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nl'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-smi du 23 mars 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-dhcpv6 du 23 mars 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-ncs du 23 mars 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-ios-ikev2 du 23 mars 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-lisp du 23 mars 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-l4f du 23 mars 2016","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160323-sip du 23 mars 2016","url":null}]}
