Lucene search

K
cveCiscoCVE-2015-6280
HistorySep 28, 2015 - 2:59 a.m.

CVE-2015-6280

2015-09-2802:59:12
CWE-287
cisco
web.nvd.nist.gov
42
cisco
ios
sshv2
cve-2015-6280
vulnerability
rsa authentication
cisco ios vulnerability
remote access

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

Low

EPSS

0.004

Percentile

75.1%

The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013.

Affected configurations

Nvd
Node
ciscoiosMatch15.2\(1\)sy
OR
ciscoiosMatch15.2\(1\)sy0a
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2\)ea1
OR
ciscoiosMatch15.2\(2a\)e1
OR
ciscoiosMatch15.2\(2a\)e2
OR
ciscoiosMatch15.2\(3\)e
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.2\(3a\)e
OR
ciscoiosMatch15.3\(3\)m1
OR
ciscoiosMatch15.3\(3\)m2
OR
ciscoiosMatch15.3\(3\)m3
OR
ciscoiosMatch15.3\(3\)m4
OR
ciscoiosMatch15.3\(3\)m5
OR
ciscoiosMatch15.3\(3\)s
OR
ciscoiosMatch15.3\(3\)s1
OR
ciscoiosMatch15.3\(3\)s1a
OR
ciscoiosMatch15.3\(3\)s2
OR
ciscoiosMatch15.3\(3\)s3
OR
ciscoiosMatch15.3\(3\)s4
OR
ciscoiosMatch15.3\(3\)s5
OR
ciscoiosMatch15.4\(1\)cg
OR
ciscoiosMatch15.4\(1\)cg1
OR
ciscoiosMatch15.4\(1\)s
OR
ciscoiosMatch15.4\(1\)s1
OR
ciscoiosMatch15.4\(1\)s2
OR
ciscoiosMatch15.4\(1\)s3
OR
ciscoiosMatch15.4\(1\)t
OR
ciscoiosMatch15.4\(1\)t1
OR
ciscoiosMatch15.4\(1\)t2
OR
ciscoiosMatch15.4\(1\)t3
OR
ciscoiosMatch15.4\(2\)cg
OR
ciscoiosMatch15.4\(2\)s
OR
ciscoiosMatch15.4\(2\)s1
OR
ciscoiosMatch15.4\(2\)s2
OR
ciscoiosMatch15.4\(2\)t
OR
ciscoiosMatch15.4\(2\)t1
OR
ciscoiosMatch15.4\(2\)t2
OR
ciscoiosMatch15.4\(3\)m
OR
ciscoiosMatch15.4\(3\)m1
OR
ciscoiosMatch15.4\(3\)m2
OR
ciscoiosMatch15.4\(3\)s
OR
ciscoiosMatch15.4\(3\)s1
OR
ciscoiosMatch15.4\(3\)s2
OR
ciscoiosMatch15.5\(1\)s
OR
ciscoiosMatch15.5\(1\)t
OR
ciscoios_xeMatch3.6e.0
OR
ciscoios_xeMatch3.6e.0a
OR
ciscoios_xeMatch3.6e.0b
OR
ciscoios_xeMatch3.6e.1
OR
ciscoios_xeMatch3.6e.2
OR
ciscoios_xeMatch3.6e.2a
OR
ciscoios_xeMatch3.7e.0
OR
ciscoios_xeMatch3.10s.0
OR
ciscoios_xeMatch3.10s.0a
OR
ciscoios_xeMatch3.10s.01
OR
ciscoios_xeMatch3.10s.1
OR
ciscoios_xeMatch3.10s.2
OR
ciscoios_xeMatch3.10s.3
OR
ciscoios_xeMatch3.10s.4
OR
ciscoios_xeMatch3.10s.5
OR
ciscoios_xeMatch3.11s.0
OR
ciscoios_xeMatch3.11s.1
OR
ciscoios_xeMatch3.11s.2
OR
ciscoios_xeMatch3.11s.3
OR
ciscoios_xeMatch3.12s.0
OR
ciscoios_xeMatch3.12s.1
OR
ciscoios_xeMatch3.12s.2
OR
ciscoios_xeMatch3.13s.0
OR
ciscoios_xeMatch3.13s.1
OR
ciscoios_xeMatch3.13s.2
OR
ciscoios_xeMatch3.14s.0
VendorProductVersionCPE
ciscoios15.2(1)sycpe:2.3:o:cisco:ios:15.2\(1\)sy:*:*:*:*:*:*:*
ciscoios15.2(1)sy0acpe:2.3:o:cisco:ios:15.2\(1\)sy0a:*:*:*:*:*:*:*
ciscoios15.2(2)ecpe:2.3:o:cisco:ios:15.2\(2\)e:*:*:*:*:*:*:*
ciscoios15.2(2)e1cpe:2.3:o:cisco:ios:15.2\(2\)e1:*:*:*:*:*:*:*
ciscoios15.2(2)e2cpe:2.3:o:cisco:ios:15.2\(2\)e2:*:*:*:*:*:*:*
ciscoios15.2(2)ea1cpe:2.3:o:cisco:ios:15.2\(2\)ea1:*:*:*:*:*:*:*
ciscoios15.2(2a)e1cpe:2.3:o:cisco:ios:15.2\(2a\)e1:*:*:*:*:*:*:*
ciscoios15.2(2a)e2cpe:2.3:o:cisco:ios:15.2\(2a\)e2:*:*:*:*:*:*:*
ciscoios15.2(3)ecpe:2.3:o:cisco:ios:15.2\(3\)e:*:*:*:*:*:*:*
ciscoios15.2(3)eacpe:2.3:o:cisco:ios:15.2\(3\)ea:*:*:*:*:*:*:*
Rows per page:
1-10 of 741

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

Low

EPSS

0.004

Percentile

75.1%