var-201507-0531
Vulnerability from variot
The PPPoE establishment implementation in Cisco IOS XE 3.5.0S on ASR 1000 devices allows remote attackers to cause a denial of service (device reload) by sending malformed PPPoE Active Discovery Request (PADR) packets on the local network, aka Bug ID CSCty94202. This issue is being tracked by Cisco Bug ID CSCty94202
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0531", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xe", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "3.5.0s" }, { "model": "asr 1001 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 1001-x router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 1002 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 1002-x router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 1004 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 1006 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 1013 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "ios xe 3.5.0s", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios xe software 3.5s.0", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "BID", "id": "75585" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "NVD", "id": "CVE-2015-4243" }, { "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4243" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "75585" } ], "trust": 0.3 }, "cve": "CVE-2015-4243", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-4243", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2015-04437", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-82204", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4243", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-04437", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201507-195", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-82204", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "VULHUB", "id": "VHN-82204" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "NVD", "id": "CVE-2015-4243" }, { "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The PPPoE establishment implementation in Cisco IOS XE 3.5.0S on ASR 1000 devices allows remote attackers to cause a denial of service (device reload) by sending malformed PPPoE Active Discovery Request (PADR) packets on the local network, aka Bug ID CSCty94202. \nThis issue is being tracked by Cisco Bug ID CSCty94202", "sources": [ { "db": "NVD", "id": "CVE-2015-4243" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "BID", "id": "75585" }, { "db": "VULHUB", "id": "VHN-82204" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4243", "trust": 3.4 }, { "db": "SECTRACK", "id": "1032805", "trust": 1.1 }, { "db": "BID", "id": "75585", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-003494", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-195", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-04437", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-82204", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "VULHUB", "id": "VHN-82204" }, { "db": "BID", "id": "75585" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "NVD", "id": "CVE-2015-4243" }, { "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "id": "VAR-201507-0531", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "VULHUB", "id": "VHN-82204" } ], "trust": 1.435763235 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" } ] }, "last_update_date": "2023-12-18T13:39:17.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "39675", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39675" }, { "title": "Patch for Cisco ASR 1000 IOS XE PPPoE Process Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/60678" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-82204" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "NVD", "id": "CVE-2015-4243" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39675" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032805" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4243" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4243" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-xe/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "VULHUB", "id": "VHN-82204" }, { "db": "BID", "id": "75585" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "NVD", "id": "CVE-2015-4243" }, { "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-04437" }, { "db": "VULHUB", "id": "VHN-82204" }, { "db": "BID", "id": "75585" }, { "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "db": "NVD", "id": "CVE-2015-4243" }, { "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2015-04437" }, { "date": "2015-07-08T00:00:00", "db": "VULHUB", "id": "VHN-82204" }, { "date": "2015-07-07T00:00:00", "db": "BID", "id": "75585" }, { "date": "2015-07-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "date": "2015-07-08T14:59:03.817000", "db": "NVD", "id": "CVE-2015-4243" }, { "date": "2015-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-14T00:00:00", "db": "CNVD", "id": "CNVD-2015-04437" }, { "date": "2016-12-29T00:00:00", "db": "VULHUB", "id": "VHN-82204" }, { "date": "2015-07-07T00:00:00", "db": "BID", "id": "75585" }, { "date": "2015-07-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003494" }, { "date": "2016-12-29T13:33:53.227000", "db": "NVD", "id": "CVE-2015-4243" }, { "date": "2015-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-195" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-195" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASR 1000 Runs on the device Cisco IOS XE of PPPoE establishment Service disruption in implementations (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003494" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-195" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.