FKIE_CVE-2015-0647

Vulnerability from fkie_nvd - Published: 2015-03-26 10:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) UDP packets, aka Bug ID CSCum98371.
Impacted products
Vendor Product Version
cisco ios 12.2\(33\)ird1
cisco ios 12.2\(33\)ire3
cisco ios 12.2\(33\)sxi4b
cisco ios 12.2\(44\)ex
cisco ios 12.2\(44\)ex1
cisco ios 12.2\(44\)sq1
cisco ios 12.2\(46\)se
cisco ios 12.2\(46\)se1
cisco ios 12.2\(46\)se2
cisco ios 12.2\(50\)se
cisco ios 12.2\(50\)se1
cisco ios 12.2\(50\)se2
cisco ios 12.2\(50\)se3
cisco ios 12.2\(50\)se4
cisco ios 12.2\(50\)se5
cisco ios 12.2\(52\)se
cisco ios 12.2\(52\)se1
cisco ios 12.2\(55\)se
cisco ios 12.2\(55\)se3
cisco ios 12.2\(55\)se4
cisco ios 12.2\(55\)se5
cisco ios 12.2\(55\)se6
cisco ios 12.2\(55\)se7
cisco ios 12.2\(55\)se8
cisco ios 12.2\(55\)se9
cisco ios 12.2\(58\)se2
cisco ios 12.4\(25e\)jam1
cisco ios 12.4\(25e\)jap1m
cisco ios 12.4\(25e\)jaz1
cisco ios 15.0\(1\)ey
cisco ios 15.0\(1\)ey1
cisco ios 15.0\(1\)ey2
cisco ios 15.0\(2\)eb
cisco ios 15.0\(2\)ed1
cisco ios 15.0\(2\)ey
cisco ios 15.0\(2\)ey1
cisco ios 15.0\(2\)ey2
cisco ios 15.0\(2\)ey3
cisco ios 15.0\(2\)se
cisco ios 15.0\(2\)se1
cisco ios 15.0\(2\)se2
cisco ios 15.0\(2\)se3
cisco ios 15.0\(2\)se4
cisco ios 15.0\(2\)se5
cisco ios 15.0\(2\)se6
cisco ios 15.0\(2\)se7
cisco ios 15.2\(1\)ex
cisco ios 15.2\(1\)ey
cisco ios 15.2\(2\)e1
cisco ios 15.2\(2\)jb1
cisco ios 15.3\(2\)s2
cisco ios 15.3\(3\)ja
cisco ios 15.3\(3\)ja1
cisco ios 15.3\(3\)ja1m
cisco ios 15.3\(3\)ja1n
cisco ios 15.3\(3\)jaa
cisco ios 15.3\(3\)jab
cisco ios 15.3\(3\)jab1
cisco ios 15.3\(3\)jnb

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)ird1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA00878-FA42-4234-B3CD-F2F07F7CE9EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)ire3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B785F54A-DD27-4422-8F25-0A6EB3E36EEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "95470E1A-2FEC-41DA-8259-EE4F890A32B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "E632468F-4B62-4937-8CA6-5B8023451F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C853E612-2C4B-4595-AD6F-22E34B68C69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq1:*:*:*:*:*:*:*",
              "matchCriteriaId": "742DA70E-6FF9-451D-9E62-F81EFB0BEB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E61C16-55F9-4054-8CC2-38D5197A1FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49E8D759-07E9-49DB-B8EB-A9C06A8D8031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EF0685-7BEF-4F84-902C-DFE533CD2F34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F114FD7-F62C-4A24-9CE6-C9A7136465F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "892F72BE-B65F-4271-9042-3B459DFBB43C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7715D0D0-E8B2-444A-A590-7B5B0BFA713F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B526DE1-EEA7-47E4-B291-09C02F018A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "5898745E-C1D3-4D0E-8476-2EEAA4327B5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "887C5632-F3F7-4EDB-A065-D81F64A9B15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
              "matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
              "matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FFBD57-E751-42C8-AE89-CD2073F45688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jap1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D3B067-46F9-460B-A3EB-7FCA3DDA7E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CA75FF-8C2E-4D9C-BE57-34EF801C28D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)eb:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FCA457-9074-4876-A21A-144F03CD6450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D3C419-D1FF-45E8-A5B1-AFFC59567478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
              "matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
              "matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E92C269-3C17-4C9D-970F-E9C8EE709ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15A69BF-50B6-42BE-9F44-7A7EBA28CC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B7E5969-E55B-4EBF-ADDE-8A969174E03D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja:*:*:*:*:*:*:*",
              "matchCriteriaId": "C57A83D0-E043-4294-A61D-730FAE30CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71493AA2-49E9-4FF5-AC29-DC2426973EC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E9625-A8CF-4D0F-BB0D-9FB91391D977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DAE7DA-E0D3-4434-AD75-C8894D939A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab:*:*:*:*:*:*:*",
              "matchCriteriaId": "915E4321-D52D-4C16-8821-ED16529C9090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBEF7B94-3510-48FA-B783-1BF1C23C2C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC3CD43-F30A-484B-9285-D925C1262212",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) UDP packets, aka Bug ID CSCum98371."
    },
    {
      "lang": "es",
      "value": "Cisco IOS 12.2, 12.4, 15.0, 15.2, y 15.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes UDP de Common Industrial Protocol (CIP) malformados, tambi\u00e9n conocido como Bug ID CSCum98371."
    }
  ],
  "id": "CVE-2015-0647",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-03-26T10:59:12.473",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…