Cisco ASR 5000 System Architecture Evolution Gateway High CPU Utilization Vulnerability
2015-02-17T15:33:16
ID CISCO-SA-20150217-CVE-2015-0617 Type cisco Reporter Cisco Modified 2015-02-16T21:49:54
Description
A vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASR 5500 System Architecture Evolution (SAE) Gateway could allow an unauthenticated, remote attacker to cause high CPU utilization and the SNMP process may stop responding.
The vulnerability is due to insufficient validation of malformed SNMP packets. An attacker could exploit this vulnerability by sending malformed SNMP packets to the affected system.
Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.
To exploit this vulnerability, an attacker may need access to trusted, internal networks to send malformed SNMP packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
{"id": "CISCO-SA-20150217-CVE-2015-0617", "type": "cisco", "bulletinFamily": "software", "title": "Cisco ASR 5000 System Architecture Evolution Gateway High CPU Utilization Vulnerability", "description": "A vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASR 5500 System Architecture Evolution (SAE) Gateway could allow an unauthenticated, remote attacker to cause high CPU utilization and the SNMP process may stop responding.\n\nThe vulnerability is due to insufficient validation of malformed SNMP packets. An attacker could exploit this vulnerability by sending malformed SNMP packets to the affected system.\n\nCisco has confirmed the vulnerability in a security notice; however, software updates are not available.\n\nTo exploit this vulnerability, an attacker may need access to trusted, internal networks to send malformed SNMP packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit. \n\nCisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.", "published": "2015-02-17T15:33:16", "modified": "2015-02-16T21:49:54", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150217-CVE-2015-0617", "reporter": "Cisco", "references": ["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150217-CVE-2015-0617"], "cvelist": ["CVE-2015-0617"], "lastseen": "2017-09-26T15:33:48", "history": [], "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "enchantments_done": [], "objectVersion": "1.4", "affectedSoftware": [{"name": "Cisco ASR 5000 Series Software", "version": "any", "operator": "eq"}], "_object_type": "robots.models.cisco.CiscoBulletin", "_object_types": ["robots.models.cisco.CiscoBulletin", "robots.models.base.Bulletin"]}
{"result": {"cve": [{"id": "CVE-2015-0617", "type": "cve", "title": "CVE-2015-0617", "description": "Cisco ASR 5500 System Architecture Evolution (SAE) Gateway devices allow remote attackers to cause a denial of service (CPU consumption and SNMP outage) via malformed SNMP packets, aka Bug ID CSCur13393.", "published": "2015-02-17T21:59:02", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0617", "cvelist": ["CVE-2015-0617"], "lastseen": "2017-09-08T10:27:16"}]}}