Lucene search

K
ciscoCiscoCISCO-SA-20150325-ANI
HistoryMar 25, 2015 - 4:00 p.m.

Multiple Vulnerabilities in Cisco IOS Software and IOS XE Software Autonomic Networking Infrastructure

2015-03-2516:00:00
tools.cisco.com
13

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:P/A:C

EPSS

0.004

Percentile

73.8%

The Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software and IOS XE Software has multiple vulnerabilities which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or gain limited command and control of the device.

Autonomic Networking Registration Authority Spoofing Vulnerability
Autonomic Networking Infrastructure Spoofed Autonomic Networking Messages Denial of Service Vulnerability
Autonomic Networking Infrastructure Device Reload Denial of Service Vulnerability
Cisco has released software updates that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani”]

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html [“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html”]

Affected configurations

Vulners
Node
ciscoiosMatch15.3s
OR
ciscoiosMatch15.2jb
OR
ciscoiosMatch15.4s
OR
ciscoiosMatch15.4sn
OR
ciscoiosMatch15.3jn
OR
ciscoiosMatch12.4jap
OR
ciscoiosMatch15.3ja
OR
ciscoiosMatch15.3jnb
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.12sxe
OR
ciscocisco_iosMatch3.13sxe
OR
ciscoiosMatch15.3\(3\)s
OR
ciscoiosMatch15.3\(2\)s2
OR
ciscoiosMatch15.3\(3\)s1
OR
ciscoiosMatch15.3\(3\)s2
OR
ciscoiosMatch15.3\(3\)s3
OR
ciscoiosMatch15.3\(3\)s6
OR
ciscoiosMatch15.3\(3\)s4
OR
ciscoiosMatch15.3\(3\)s5
OR
ciscoiosMatch15.3\(3\)s2a
OR
ciscoiosMatch15.3\(3\)s8
OR
ciscoiosMatch15.3\(3\)s9
OR
ciscoiosMatch15.3\(3\)s10
OR
ciscoiosMatch15.2\(2\)jb1
OR
ciscoiosMatch15.4\(1\)s
OR
ciscoiosMatch15.4\(3\)s
OR
ciscoiosMatch15.4\(1\)s1
OR
ciscoiosMatch15.4\(1\)s2
OR
ciscoiosMatch15.4\(2\)s1
OR
ciscoiosMatch15.4\(1\)s3
OR
ciscoiosMatch15.4\(2\)s2
OR
ciscoiosMatch15.4\(2\)sn
OR
ciscoiosMatch15.4\(2\)sn1
OR
ciscoiosMatch15.4\(3\)sn1
OR
ciscoiosMatch15.3\(3\)jn
OR
ciscoiosMatch12.4\(25e\)jap1m
OR
ciscoiosMatch15.3\(3\)ja1n
OR
ciscoiosMatch15.3\(3\)jnb
OR
ciscocisco_iosMatch3.10.4sxe
OR
ciscocisco_iosMatch3.10.1xcsxe
OR
ciscocisco_iosMatch3.12.0sxe
OR
ciscocisco_iosMatch3.12.1sxe
OR
ciscocisco_iosMatch3.12.2sxe
OR
ciscocisco_iosMatch3.12.0asxe
OR
ciscocisco_iosMatch3.13.0sxe
VendorProductVersionCPE
ciscoios15.3scpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*
ciscoios15.2jbcpe:2.3:o:cisco:ios:15.2jb:*:*:*:*:*:*:*
ciscoios15.4scpe:2.3:o:cisco:ios:15.4s:*:*:*:*:*:*:*
ciscoios15.4sncpe:2.3:o:cisco:ios:15.4sn:*:*:*:*:*:*:*
ciscoios15.3jncpe:2.3:o:cisco:ios:15.3jn:*:*:*:*:*:*:*
ciscoios12.4japcpe:2.3:o:cisco:ios:12.4jap:*:*:*:*:*:*:*
ciscoios15.3jacpe:2.3:o:cisco:ios:15.3ja:*:*:*:*:*:*:*
ciscoios15.3jnbcpe:2.3:o:cisco:ios:15.3jnb:*:*:*:*:*:*:*
ciscocisco_ios3.10scpe:2.3:o:cisco:cisco_ios:3.10s:xe:*:*:*:*:*:*
ciscocisco_ios3.12scpe:2.3:o:cisco:cisco_ios:3.12s:xe:*:*:*:*:*:*
Rows per page:
1-10 of 451

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:P/A:C

EPSS

0.004

Percentile

73.8%