Lucene search

K
ciscoCiscoCISCO-SA-20150529-CVE-2015-0743
HistoryMay 29, 2015 - 8:12 p.m.

Cisco Headend System Release UDP TFTP and DHCP Denial of Service Vulnerability

2015-05-2920:12:55
tools.cisco.com
9

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

48.8%

A vulnerability in the UDP applications TFTP and DHCP of Cisco Headend System Release could allow an unauthenticated, remote attacker to take the TFTP and DHCP listening ports offline for a period of time.

The vulnerability is due to a particular UDP traffic pattern in addition to the amount of UDP traffic generated. An attacker could exploit this vulnerability by sending crafted UDP packets for TFTP and DHCP to the device. An exploit could allow the attacker to take the TFTP and DHCP ports offline so those ports do not respond to incoming requests, resulting in a denial of service (DoS) condition.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker may need access to trusted, internal networks to send crafted UDP packets for TFTP and DHCP to the affected device. This access requirement may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscofiresight_systemMatchany
OR
ciscofiresight_systemMatchany

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

48.8%

Related for CISCO-SA-20150529-CVE-2015-0743