Lucene search

K
ciscoCiscoCISCO-SA-20150325-CIP
HistoryMar 25, 2015 - 4:00 p.m.

Multiple Vulnerabilities in Cisco IOS Software Common Industrial Protocol

2015-03-2516:00:00
tools.cisco.com
16

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.2%

The Cisco IOS Software implementation of the Common Industrial Protocol (CIP) feature contains the following vulnerabilities when processing crafted CIP packets that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition:

Cisco IOS Software UDP CIP Denial of Service Vulnerability
Cisco IOS Software TCP CIP Packet Memory Leak Vulnerability
Cisco IOS Software TCP CIP Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to cause a reload of the forwarding plane, resulting in an interruption of services on an affected device. Repeated exploitation could result in a sustained DoS condition.

Additionally, successful exploitation of Cisco IOS Software TCP CIP Packet Memory Leak Vulnerability could allow an unauthenticated, remote attacker to cause a memory leak on an affected device.

Cisco has released software updates that address these vulnerabilities. This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip”]

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html”]

Affected configurations

Vulners
Node
ciscoiosMatch12.2se
OR
ciscoiosMatch12.2ex
OR
ciscoiosMatch15.0ey
OR
ciscoiosMatch15.0se
OR
ciscoiosMatch15.0ex
OR
ciscoiosMatch15.3s
OR
ciscoiosMatch15.0ea
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.2jb
OR
ciscoiosMatch15.2ey
OR
ciscoiosMatch15.2jaz
OR
ciscoiosMatch15.2ea
OR
ciscoiosMatch15.3jn
OR
ciscoiosMatch12.4jap
OR
ciscoiosMatch15.3ja
OR
ciscoiosMatch15.3jaa
OR
ciscoiosMatch15.3jab
OR
ciscoiosMatch15.3jnb
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(46\)se2
OR
ciscoiosMatch12.2\(50\)se2
OR
ciscoiosMatch12.2\(50\)se1
OR
ciscoiosMatch12.2\(50\)se5
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(52\)se
OR
ciscoiosMatch12.2\(58\)se
OR
ciscoiosMatch12.2\(50\)se3
OR
ciscoiosMatch12.2\(52\)se1
OR
ciscoiosMatch12.2\(46\)se1
OR
ciscoiosMatch12.2\(50\)se4
OR
ciscoiosMatch12.2\(50\)se
OR
ciscoiosMatch12.2\(58\)se1
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)se7
OR
ciscoiosMatch12.2\(55\)se8
OR
ciscoiosMatch12.2\(55\)se9
OR
ciscoiosMatch12.2\(55\)se10
OR
ciscoiosMatch12.2\(55\)se13
OR
ciscoiosMatch12.2\(44\)ex
OR
ciscoiosMatch12.2\(44\)ex1
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey1
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(2\)ey
OR
ciscoiosMatch15.0\(2\)ey1
OR
ciscoiosMatch15.0\(2\)ey2
OR
ciscoiosMatch15.0\(2\)ey3
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(2\)se1
OR
ciscoiosMatch15.0\(2\)se2
OR
ciscoiosMatch15.0\(2\)se3
OR
ciscoiosMatch15.0\(2\)se4
OR
ciscoiosMatch15.0\(2\)se5
OR
ciscoiosMatch15.0\(2\)se6
OR
ciscoiosMatch15.0\(2\)se7
OR
ciscoiosMatch15.0\(2\)se8
OR
ciscoiosMatch15.0\(2\)se9
OR
ciscoiosMatch15.0\(2\)se10
OR
ciscoiosMatch15.0\(2\)se11
OR
ciscoiosMatch15.0\(2\)se10a
OR
ciscoiosMatch15.0\(2\)se12
OR
ciscoiosMatch15.0\(2\)ex2
OR
ciscoiosMatch15.0\(2\)ex8
OR
ciscoiosMatch15.3\(2\)s2
OR
ciscoiosMatch15.0\(2\)ea
OR
ciscoiosMatch15.0\(2\)ea1
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2b\)e
OR
ciscoiosMatch15.2\(2\)jb1
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.2\(4\)jaz
OR
ciscoiosMatch15.2\(4\)jaz1
OR
ciscoiosMatch15.2\(2\)ea
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.3\(3\)jn
OR
ciscoiosMatch12.4\(25e\)jap1m
OR
ciscoiosMatch15.3\(3\)ja
OR
ciscoiosMatch15.3\(3\)ja1n
OR
ciscoiosMatch15.3\(3\)ja1m
OR
ciscoiosMatch15.3\(3\)ja1
OR
ciscoiosMatch15.3\(3\)ja2
OR
ciscoiosMatch15.3\(3\)jaa
OR
ciscoiosMatch15.3\(3\)jab
OR
ciscoiosMatch15.3\(3\)jnb
VendorProductVersionCPE
ciscoios12.2secpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*
ciscoios12.2excpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*
ciscoios15.0eycpe:2.3:o:cisco:ios:15.0ey:*:*:*:*:*:*:*
ciscoios15.0secpe:2.3:o:cisco:ios:15.0se:*:*:*:*:*:*:*
ciscoios15.0excpe:2.3:o:cisco:ios:15.0ex:*:*:*:*:*:*:*
ciscoios15.3scpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*
ciscoios15.0eacpe:2.3:o:cisco:ios:15.0ea:*:*:*:*:*:*:*
ciscoios15.2ecpe:2.3:o:cisco:ios:15.2e:*:*:*:*:*:*:*
ciscoios15.2jbcpe:2.3:o:cisco:ios:15.2jb:*:*:*:*:*:*:*
ciscoios15.2eycpe:2.3:o:cisco:ios:15.2ey:*:*:*:*:*:*:*
Rows per page:
1-10 of 881

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.2%