VAR-201506-0157
Vulnerability from variot - Updated: 2023-12-18 13:29Cisco ONS 15454 System Software 10.30 and 10.301 allows remote attackers to cause a denial of service (tNetTask CPU consumption or card reset) via a flood of (1) IP or (2) Ethernet traffic, aka Bug ID CSCus57263. Cisco ONS 15454 System Software is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause the control card on an affected device to reset, denying service to legitimate users. This issue is being tracked by Cisco bug ID CSCus57263. Cisco ONS 15454 System Software is a set of multi-service provisioning platform for Cisco optical transmission products of American Cisco (Cisco)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201506-0157",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ons 15454 system software",
"scope": "eq",
"trust": 2.4,
"vendor": "cisco",
"version": "10.30"
},
{
"model": "ons 15454 system software",
"scope": "eq",
"trust": 2.4,
"vendor": "cisco",
"version": "10.301"
},
{
"model": "ons 15454",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "ons system software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1545410.301"
},
{
"model": "ons system software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1545410.30"
}
],
"sources": [
{
"db": "BID",
"id": "75002"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ons_15454_system_software:10.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ons_15454_system_software:10.301:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0765"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "75002"
}
],
"trust": 0.3
},
"cve": "CVE-2015-0765",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2015-0765",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-78711",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-0765",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201506-054",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-78711",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-0765",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78711"
},
{
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco ONS 15454 System Software 10.30 and 10.301 allows remote attackers to cause a denial of service (tNetTask CPU consumption or card reset) via a flood of (1) IP or (2) Ethernet traffic, aka Bug ID CSCus57263. Cisco ONS 15454 System Software is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to cause the control card on an affected device to reset, denying service to legitimate users. \nThis issue is being tracked by Cisco bug ID CSCus57263. Cisco ONS 15454 System Software is a set of multi-service provisioning platform for Cisco optical transmission products of American Cisco (Cisco)",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "BID",
"id": "75002"
},
{
"db": "VULHUB",
"id": "VHN-78711"
},
{
"db": "VULMON",
"id": "CVE-2015-0765"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-0765",
"trust": 2.9
},
{
"db": "SECTRACK",
"id": "1032483",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201506-054",
"trust": 0.7
},
{
"db": "BID",
"id": "75002",
"trust": 0.5
},
{
"db": "VULHUB",
"id": "VHN-78711",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-0765",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78711"
},
{
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"db": "BID",
"id": "75002"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"id": "VAR-201506-0157",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-78711"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:29:36.530000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "39172",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39172"
},
{
"title": "Cisco: Cisco ONS 15454 System Software Denial of Service Vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20150603-cve-2015-0765"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78711"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "NVD",
"id": "CVE-2015-0765"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39172"
},
{
"trust": 1.2,
"url": "http://www.securitytracker.com/id/1032483"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0765"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0765"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/399.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/75002"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150603-cve-2015-0765"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78711"
},
{
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"db": "BID",
"id": "75002"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-78711"
},
{
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"db": "BID",
"id": "75002"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-04T00:00:00",
"db": "VULHUB",
"id": "VHN-78711"
},
{
"date": "2015-06-04T00:00:00",
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"date": "2015-06-03T00:00:00",
"db": "BID",
"id": "75002"
},
{
"date": "2015-06-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"date": "2015-06-04T10:59:05.957000",
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"date": "2015-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-01-04T00:00:00",
"db": "VULHUB",
"id": "VHN-78711"
},
{
"date": "2017-01-04T00:00:00",
"db": "VULMON",
"id": "CVE-2015-0765"
},
{
"date": "2015-06-03T00:00:00",
"db": "BID",
"id": "75002"
},
{
"date": "2015-06-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002944"
},
{
"date": "2017-01-04T15:53:20.780000",
"db": "NVD",
"id": "CVE-2015-0765"
},
{
"date": "2015-06-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco ONS 15454 Service operation interruption in system software (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002944"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-054"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…