CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
56.2%
The Cisco IOS Software implementation of the Common Industrial Protocol (CIP) feature contains the following vulnerabilities when processing crafted CIP packets that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition:
Cisco IOS Software UDP CIP Denial of Service Vulnerability
Cisco IOS Software TCP CIP Packet Memory Leak Vulnerability
Cisco IOS Software TCP CIP Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to cause a reload of the forwarding plane, resulting in an interruption of services on an affected device. Repeated exploitation could result in a sustained DoS condition.
Additionally, successful exploitation of Cisco IOS Software TCP CIP Packet Memory Leak Vulnerability could allow an unauthenticated, remote attacker to cause a memory leak on an affected device.
Cisco has released software updates that address these vulnerabilities. This advisory is available at the following link:
Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ios | 12.2se | cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:* |
cisco | ios | 12.2ex | cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:* |
cisco | ios | 15.0ey | cpe:2.3:o:cisco:ios:15.0ey:*:*:*:*:*:*:* |
cisco | ios | 15.0se | cpe:2.3:o:cisco:ios:15.0se:*:*:*:*:*:*:* |
cisco | ios | 15.0ex | cpe:2.3:o:cisco:ios:15.0ex:*:*:*:*:*:*:* |
cisco | ios | 15.3s | cpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:* |
cisco | ios | 15.0ea | cpe:2.3:o:cisco:ios:15.0ea:*:*:*:*:*:*:* |
cisco | ios | 15.2e | cpe:2.3:o:cisco:ios:15.2e:*:*:*:*:*:*:* |
cisco | ios | 15.2jb | cpe:2.3:o:cisco:ios:15.2jb:*:*:*:*:*:*:* |
cisco | ios | 15.2ey | cpe:2.3:o:cisco:ios:15.2ey:*:*:*:*:*:*:* |