CVE-2015-6280
Vulnerability from cvelistv5
Published
2015-09-28 01:00
Modified
2024-08-06 07:15
Severity ?
EPSS score ?
Summary
The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:15:13.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033646", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033646" }, { "name": "20150923 Cisco IOS and IOS XE Software SSH Version 2 RSA-Based User Authentication Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-06T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1033646", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033646" }, { "name": "20150923 Cisco IOS and IOS XE Software SSH Version 2 RSA-Based User Authentication Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033646", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033646" }, { "name": "20150923 Cisco IOS and IOS XE Software SSH Version 2 RSA-Based User Authentication Bypass Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk" }, { "name": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6280", "datePublished": "2015-09-28T01:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:15:13.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)sy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AE57C85-794E-405B-841F-A806D32C08EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)sy0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B91687C-A8F8-45FB-BF03-8534E9230AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3A156FE-590E-49DB-819D-4103D629829D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F6C767-042C-4277-90F4-F81D9AFFF227\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D33DB919-4F82-43C6-830A-A9D4FC043B42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C846C74-7644-4DAB-A4B8-B33464EBE92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3a\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"260E5F96-48DB-41C4-B45E-5BE0367DD7E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"499C6196-2D34-4312-9C3E-B1A6E8D21112\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B828AA0-E0B2-4897-AF28-FC80B9FF81BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9279A96A-43B2-4FD4-97F0-DA331EACF918\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3479B06E-1B67-4399-BA3A-E02331E21BE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB84CE04-F2D0-4A37-B2BA-25126D1824D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8957EB38-37CF-47FA-853D-7A1AA6079874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63ACFACC-23B7-4EAC-BDC0-E3C403642D88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F3A95D5-157D-4335-87B4-8DA080A496FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D54B325-22D5-4F21-BE28-BE28F6135FBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)cg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D962FBA3-CE59-401B-9451-45001775BA66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)cg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C13F2837-174B-4437-BF3F-CB6BFBF8F64D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"237D305E-016D-4E84-827C-44D04E3E0999\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E993A32E-D2AF-4519-B4C9-7F576649D20F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7260A66D-D477-440E-9A87-C05F9BD9E67C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31059ED1-4D82-43D7-8EF7-042125289CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1EE552E-226C-46DE-9861-CB148AD8FB44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAF02C8E-9BB2-4DC2-8BF1-932835191F09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)cg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA8E0069-21AB-497F-9F4C-6F7C041BA0E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4151B2B1-B17F-4F1D-A211-34C7DB84E442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37B550C9-B2E4-44EE-8E0B-54D150C69A0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEBBA614-74E7-43C7-8D33-ADF4BD79D477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74E1226B-46CF-4C82-911A-86C818A75DFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"100DA24F-464E-4273-83DF-6428D0ED6641\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"063C0C47-25EB-4AA4-9332-8E43CD60FF39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C85BAAF-819B-40E7-9099-04AA8D9AB114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED684DB4-527A-4268-B197-4719B0178429\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88F41406-0F55-4D74-A4F6-4ABD5A803907\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4408CD8-DC1D-4102-924B-E9E28FC5CECF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2A39749-3A95-41B6-850B-4D388E6242B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9613EE90-A90A-4817-A5A1-F78A9F3BA571\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59F21FEC-A536-45CB-9AE5-61CE45EAD1B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6e.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E894C8-CF2E-4933-99C7-E45E8F9076BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6e.0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB850D59-3C11-4DA4-913F-4B956A68AFD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6e.0b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED5DCB31-15DC-4897-812B-4FBB217C777D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6e.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FFBC8FE-981D-4B3F-8734-F54508043F6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6e.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A84AE4B1-B969-42D9-B050-C4E422573AD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6e.2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7350EC86-E51F-4B70-95ED-B75E9E2B901B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7e.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6C3D268-F739-45FE-89B3-2C754CAF5B07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C1C77A7-FCD5-4558-A351-081D6678DB21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B42071-2BAA-4459-B575-EBD72A111381\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"337ED1D1-0044-4D98-B53B-8D30859DF38E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24C948D8-C540-4FF1-A9F7-BFB20E5541FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AF1294B-B4F6-40CC-A115-942B18CDA361\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B72E6572-FF41-4606-9DA5-FA486D591A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B74B72D9-AB41-4D98-BEF5-3CA37F68F645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10s.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FC3A52D-50B6-44F0-A20B-09EE462EB0BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11s.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0A98DFE-18FF-455A-AFA6-49960CB98C85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11s.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"277C9543-A842-45AB-A2EF-DB2F8412D748\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11s.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C942D30-8344-425E-804E-E1BB1F1F0D22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.11s.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7382973-7673-4D6E-8716-AFDE2EB04C94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12s.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5E6FF1A-D90D-412A-8159-E766DC14FA57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12s.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84E6DEE6-50EF-4333-B0B9-964A633734D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12s.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D83A5AC0-C583-4B2E-8F08-989B3EF3F4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13s.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28303ADA-1B8E-42F6-9CD1-A457D863727B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13s.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B331605-E70D-4A93-AB19-6E31A31C5256\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13s.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7252C89C-0327-47A2-826D-5853F387CB5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14s.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E34D1F55-ABD8-4F38-9CE8-C2A9CBC9A08B\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en la funcionalidad SSHv2 en Cisco IOS 15.2, 15.3, 15.4 y 15.5 y IOS XE 3.6E en versiones anteriores a 3.6.3E, 3.7E en versiones anteriores a 3.7.1E, 3.10S en versiones anteriores a 3.10.6S, 3.11S en versiones anteriores a 3.11.4S, 3.12S en versiones anteriores a 3.12.3S, 3.13S en versiones anteriores a 3.13.3S y 3.14S en versiones anteriores a 3.14.1S, no implementa adecuadamente la autenticaci\\u00f3n RSA, lo que permite a atacantes remotos obtener el acceso de inicio de sesi\\u00f3n mediante el aprovechamiento de los conocimientos de un nombre de usuario y la clave p\\u00fablica asociada, tambi\\u00e9n conocido como Bug ID CSCus73013.\"}]", "id": "CVE-2015-6280", "lastModified": "2024-11-21T02:34:41.753", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2015-09-28T02:59:12.013", "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1033646\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1033646\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2015-6280\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2015-09-28T02:59:12.013\",\"lastModified\":\"2024-11-21T02:34:41.753\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSHv2 functionality in Cisco IOS 15.2, 15.3, 15.4, and 15.5 and IOS XE 3.6E before 3.6.3E, 3.7E before 3.7.1E, 3.10S before 3.10.6S, 3.11S before 3.11.4S, 3.12S before 3.12.3S, 3.13S before 3.13.3S, and 3.14S before 3.14.1S does not properly implement RSA authentication, which allows remote attackers to obtain login access by leveraging knowledge of a username and the associated public key, aka Bug ID CSCus73013.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en la funcionalidad SSHv2 en Cisco IOS 15.2, 15.3, 15.4 y 15.5 y IOS XE 3.6E en versiones anteriores a 3.6.3E, 3.7E en versiones anteriores a 3.7.1E, 3.10S en versiones anteriores a 3.10.6S, 3.11S en versiones anteriores a 3.11.4S, 3.12S en versiones anteriores a 3.12.3S, 3.13S en versiones anteriores a 3.13.3S y 3.14S en versiones anteriores a 3.14.1S, no implementa adecuadamente la autenticaci\u00f3n RSA, lo que permite a atacantes remotos obtener el acceso de inicio de sesi\u00f3n mediante el aprovechamiento de los conocimientos de un nombre de usuario y la clave p\u00fablica asociada, tambi\u00e9n conocido como Bug ID CSCus73013.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE57C85-794E-405B-841F-A806D32C08EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)sy0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B91687C-A8F8-45FB-BF03-8534E9230AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C846C74-7644-4DAB-A4B8-B33464EBE92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E5F96-48DB-41C4-B45E-5BE0367DD7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"499C6196-2D34-4312-9C3E-B1A6E8D21112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B828AA0-E0B2-4897-AF28-FC80B9FF81BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9279A96A-43B2-4FD4-97F0-DA331EACF918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3479B06E-1B67-4399-BA3A-E02331E21BE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB84CE04-F2D0-4A37-B2BA-25126D1824D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8957EB38-37CF-47FA-853D-7A1AA6079874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63ACFACC-23B7-4EAC-BDC0-E3C403642D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3A95D5-157D-4335-87B4-8DA080A496FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D54B325-22D5-4F21-BE28-BE28F6135FBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)cg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D962FBA3-CE59-401B-9451-45001775BA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)cg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C13F2837-174B-4437-BF3F-CB6BFBF8F64D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237D305E-016D-4E84-827C-44D04E3E0999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993A32E-D2AF-4519-B4C9-7F576649D20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7260A66D-D477-440E-9A87-C05F9BD9E67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31059ED1-4D82-43D7-8EF7-042125289CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EE552E-226C-46DE-9861-CB148AD8FB44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF02C8E-9BB2-4DC2-8BF1-932835191F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)cg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8E0069-21AB-497F-9F4C-6F7C041BA0E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4151B2B1-B17F-4F1D-A211-34C7DB84E442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B550C9-B2E4-44EE-8E0B-54D150C69A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEBBA614-74E7-43C7-8D33-ADF4BD79D477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E1226B-46CF-4C82-911A-86C818A75DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"100DA24F-464E-4273-83DF-6428D0ED6641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063C0C47-25EB-4AA4-9332-8E43CD60FF39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C85BAAF-819B-40E7-9099-04AA8D9AB114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED684DB4-527A-4268-B197-4719B0178429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F41406-0F55-4D74-A4F6-4ABD5A803907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4408CD8-DC1D-4102-924B-E9E28FC5CECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A39749-3A95-41B6-850B-4D388E6242B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9613EE90-A90A-4817-A5A1-F78A9F3BA571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F21FEC-A536-45CB-9AE5-61CE45EAD1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6e.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E894C8-CF2E-4933-99C7-E45E8F9076BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6e.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB850D59-3C11-4DA4-913F-4B956A68AFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6e.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5DCB31-15DC-4897-812B-4FBB217C777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6e.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFBC8FE-981D-4B3F-8734-F54508043F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6e.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84AE4B1-B969-42D9-B050-C4E422573AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6e.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7350EC86-E51F-4B70-95ED-B75E9E2B901B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7e.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C3D268-F739-45FE-89B3-2C754CAF5B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1C77A7-FCD5-4558-A351-081D6678DB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B42071-2BAA-4459-B575-EBD72A111381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337ED1D1-0044-4D98-B53B-8D30859DF38E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C948D8-C540-4FF1-A9F7-BFB20E5541FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF1294B-B4F6-40CC-A115-942B18CDA361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72E6572-FF41-4606-9DA5-FA486D591A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B74B72D9-AB41-4D98-BEF5-3CA37F68F645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10s.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC3A52D-50B6-44F0-A20B-09EE462EB0BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0A98DFE-18FF-455A-AFA6-49960CB98C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"277C9543-A842-45AB-A2EF-DB2F8412D748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C942D30-8344-425E-804E-E1BB1F1F0D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.11s.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7382973-7673-4D6E-8716-AFDE2EB04C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12s.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E6FF1A-D90D-412A-8159-E766DC14FA57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12s.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E6DEE6-50EF-4333-B0B9-964A633734D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12s.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D83A5AC0-C583-4B2E-8F08-989B3EF3F4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13s.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28303ADA-1B8E-42F6-9CD1-A457D863727B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13s.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B331605-E70D-4A93-AB19-6E31A31C5256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13s.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7252C89C-0327-47A2-826D-5853F387CB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14s.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E34D1F55-ABD8-4F38-9CE8-C2A9CBC9A08B\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1033646\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk/cvrf/cisco-sa-20150923-sshpk_cvrf.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1033646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.