When considering software upgrades, customers are advised to consult the Cisco Security Advisories, Responses, and Alerts archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.

Cisco IOS Software
Cisco provides a tool to help customers determine their exposure to vulnerabilities in Cisco IOS Software. The Cisco IOS Software Checker allows customers to perform the following tasks:
Initiate a search by selecting releases from the drop-down menu or uploading a file from a local system

Enter show version command output for the tool to parse

Create a customized search by including all previously published Cisco Security Advisories, a specific publication, or all advisories in the most recent bundled publication

The tool identifies any Cisco Security Advisories that impact a queried software release and the earliest release that corrects all vulnerabilities in each Cisco Security Advisory (“First Fixed”).
If applicable, the tool also returns the earliest possible release that corrects all vulnerabilities in all displayed advisories (“Combined First Fixed”). Please visit the Cisco IOS Software Checker or enter a Cisco IOS Software release in the following field to determine whether the release is affected by any published Cisco IOS Software advisory.

(Example entry: 15.1(4)M2)

For a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to Cisco IOS XE 2 Release Notes, Cisco IOS XE 3S Release Notes, and Cisco IOS XE 3SG Release Notes.Cisco IOS XE SoftwareCisco IOS XE Software is affected by the vulnerabilities described in this advisory.CiscoIOS XESoftwareTrain
First Fixed Release forthis Advisory
First Fixed Release forAll Advisories in theSeptember 2015 Cisco IOS and IOS XESoftware Security AdvisoryBundled Publication
2.6
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.1S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.1SG
Not vulnerable
Not vulnerable
3.2S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.2SE
Vulnerable; migrate to 3.6.3E or later.
Vulnerable; migrate to 3.6.3E or later.
3.2SG
Not vulnerable
Not vulnerable
3.2SQ
Not vulnerable
Not vulnerable
3.2XO
Not vulnerable
Not vulnerable
3.3S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.3SE
Vulnerable; migrate to 3.6.3E or later.
Vulnerable; migrate to 3.6.3E or later.
3.3SG
Not vulnerable
Not vulnerable
3.3SQ
Not vulnerable
Not vulnerable
3.3XO
Vulnerable; migrate to 3.6.3E or later.
Vulnerable; migrate to 3.6.3E or later.
3.4S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.4SG
Vulnerable; migrate to 3.6.3E or later.
Vulnerable; migrate to 3.6.3E or later.
3.4SQ
Not vulnerable
Not vulnerable
3.5E
Vulnerable; migrate to 3.6.3E or later.
Vulnerable; migrate to 3.6.3E or later.
3.5S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.5SQ
Not vulnerable
Not vulnerable
3.6E
3.6.3E
3.6.3E
3.6S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.7E
3.7.2E
3.7.2E
3.7S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.8S
Not vulnerable
Vulnerable; migrate to 3.10.6S or later.
3.9S
Vulnerable; migrate to 3.10.6S or later.
Vulnerable; migrate to 3.10.6S or later.
3.10S
3.10.6S
3.10.6S
3.11S
3.11.4S
Vulnerable; migrate to 3.13.3S or later.
3.12S
Vulnerable; migrate to 3.13.3S or later.
Vulnerable; migrate to 3.13.3S or later.
3.13S
3.13.3S
3.13.3S
3.14S
3.14.2S
Vulnerable; migrate to 3.15.1S or later.
3.15S
Not vulnerable
3.15.1S
3.16S
Not vulnerable
Not vulnerable

Leave a Reply