Lucene search

K
cveCiscoCVE-2015-0681
HistoryJul 24, 2015 - 4:59 p.m.

CVE-2015-0681

2015-07-2416:59:00
CWE-399
cisco
web.nvd.nist.gov
39
cisco
ios
ios xe
tftp server
denial of service
memory management
cve-2015-0681
nvd

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

AI Score

6.7

Confidence

High

EPSS

0.006

Percentile

77.8%

The TFTP server in Cisco IOS 12.2(44)SQ1, 12.2(33)XN1, 12.4(25e)JAM1, 12.4(25e)JAO5m, 12.4(23)JY, 15.0(2)ED1, 15.0(2)EY3, 15.1(3)SVF4a, and 15.2(2)JB1 and IOS XE 2.5.x, 2.6.x, 3.1.xS, 3.2.xS, 3.3.xS, 3.4.xS, and 3.5.xS before 3.6.0S; 3.1.xSG, 3.2.xSG, and 3.3.xSG before 3.4.0SG; 3.2.xSE before 3.3.0SE; 3.2.xXO before 3.3.0XO; 3.2.xSQ; 3.3.xSQ; and 3.4.xSQ allows remote attackers to cause a denial of service (device hang or reload) via multiple requests that trigger improper memory management, aka Bug ID CSCts66733.

Affected configurations

Nvd
Node
ciscoiosMatch12.2\(33\)xn1
OR
ciscoiosMatch12.2\(44\)sq1
OR
ciscoiosMatch12.4\(23\)jy
OR
ciscoiosMatch12.4\(25e\)jam1
OR
ciscoiosMatch12.4\(25e\)jao5m
OR
ciscoiosMatch15.0\(2\)ed1
OR
ciscoiosMatch15.0\(2\)ey3
OR
ciscoiosMatch15.1\(3\)svf4a
OR
ciscoiosMatch15.2\(2\)jb1
OR
ciscoios_xeMatch2.5.0
OR
ciscoios_xeMatch2.5.1
OR
ciscoios_xeMatch2.5.2
OR
ciscoios_xeMatch2.6.0
OR
ciscoios_xeMatch2.6.1
OR
ciscoios_xeMatch2.6.2
OR
ciscoios_xeMatch3.1s.0
OR
ciscoios_xeMatch3.1s.1
OR
ciscoios_xeMatch3.1s.2
OR
ciscoios_xeMatch3.1s.3
OR
ciscoios_xeMatch3.1s.4
OR
ciscoios_xeMatch3.1s.5
OR
ciscoios_xeMatch3.1s.6
OR
ciscoios_xeMatch3.1sg.0
OR
ciscoios_xeMatch3.1sg.1
OR
ciscoios_xeMatch3.2s.0
OR
ciscoios_xeMatch3.2s.1
OR
ciscoios_xeMatch3.2s.2
OR
ciscoios_xeMatch3.2s.3
OR
ciscoios_xeMatch3.2se.0
OR
ciscoios_xeMatch3.2se.1
OR
ciscoios_xeMatch3.2se.2
OR
ciscoios_xeMatch3.2se.3
OR
ciscoios_xeMatch3.2sg.0
OR
ciscoios_xeMatch3.2sg.1
OR
ciscoios_xeMatch3.2sg.2
OR
ciscoios_xeMatch3.2sg.3
OR
ciscoios_xeMatch3.2sg.4
OR
ciscoios_xeMatch3.2sg.5
OR
ciscoios_xeMatch3.2sg.6
OR
ciscoios_xeMatch3.2sg.7
OR
ciscoios_xeMatch3.2sg.8
OR
ciscoios_xeMatch3.2sg.9
OR
ciscoios_xeMatch3.2xo.0
OR
ciscoios_xeMatch3.2xo.1
OR
ciscoios_xeMatch3.3sg.0
OR
ciscoios_xeMatch3.3sg.1
OR
ciscoios_xeMatch3.3sg.2
OR
ciscoios_xeMatch3.3sq.0
OR
ciscoios_xeMatch3.3sq.1
OR
ciscoios_xeMatch3.4s.0
OR
ciscoios_xeMatch3.4s.1
OR
ciscoios_xeMatch3.4s.2
OR
ciscoios_xeMatch3.4s.3
OR
ciscoios_xeMatch3.4s.4
OR
ciscoios_xeMatch3.4s.5
OR
ciscoios_xeMatch3.4s.6
OR
ciscoios_xeMatch3.4sq.0
OR
ciscoios_xeMatch3.4sq.1
OR
ciscoios_xeMatch3.5s.0
OR
ciscoios_xeMatch3.5s.1
OR
ciscoios_xeMatch3.5s.2
OR
ciscoios_xeMatch3.5s_base
VendorProductVersionCPE
ciscoios12.2(33)xn1cpe:2.3:o:cisco:ios:12.2\(33\)xn1:*:*:*:*:*:*:*
ciscoios12.2(44)sq1cpe:2.3:o:cisco:ios:12.2\(44\)sq1:*:*:*:*:*:*:*
ciscoios12.4(23)jycpe:2.3:o:cisco:ios:12.4\(23\)jy:*:*:*:*:*:*:*
ciscoios12.4(25e)jam1cpe:2.3:o:cisco:ios:12.4\(25e\)jam1:*:*:*:*:*:*:*
ciscoios12.4(25e)jao5mcpe:2.3:o:cisco:ios:12.4\(25e\)jao5m:*:*:*:*:*:*:*
ciscoios15.0(2)ed1cpe:2.3:o:cisco:ios:15.0\(2\)ed1:*:*:*:*:*:*:*
ciscoios15.0(2)ey3cpe:2.3:o:cisco:ios:15.0\(2\)ey3:*:*:*:*:*:*:*
ciscoios15.1(3)svf4acpe:2.3:o:cisco:ios:15.1\(3\)svf4a:*:*:*:*:*:*:*
ciscoios15.2(2)jb1cpe:2.3:o:cisco:ios:15.2\(2\)jb1:*:*:*:*:*:*:*
ciscoios_xe2.5.0cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 621

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

AI Score

6.7

Confidence

High

EPSS

0.006

Percentile

77.8%