Lucene search

K
ciscoCiscoCISCO-SA-20150514-CVE-2015-0730
HistoryMay 14, 2015 - 4:38 p.m.

Cisco Wide Area Application Services Server Message Block Protocol Module Denial of Service Vulnerability

2015-05-1416:38:49
tools.cisco.com
16

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.001

Percentile

48.6%

A vulnerability in the Server Message Block Protocol (SMB) module of Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause a reload of the SMB module.

The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted SMB Negotiate Protocol Request packet with an invalid field to a targeted device. A successful exploit could allow the attacker to cause a reload of the SMB module on the device, resulting in a partial denial of service (DoS) condition.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker may need access to trusted, internal networks to send a crafted SMB Negotiate Protocol Request packet to the device. This access requirement may limit the possibility of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscowide_area_application_servicesMatchany
OR
ciscowide_area_application_servicesMatchany
VendorProductVersionCPE
ciscowide_area_application_servicesanycpe:2.3:a:cisco:wide_area_application_services:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.001

Percentile

48.6%

Related for CISCO-SA-20150514-CVE-2015-0730