Lucene search

K
ciscoCiscoCISCO-SA-20150610-CVE-2015-0775
HistoryJun 10, 2015 - 7:29 p.m.

Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability

2015-06-1019:29:59
tools.cisco.com
29

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

65.8%

A vulnerability in the Message of the Day (MOTD) or banner functionality of the NX-OS Software could allow an unauthenticated, remote attacker to cause the login process to reset.

The vulnerability is due to the MOTD display handling when a certain type of terminal session is requested via Telnet. An attacker could exploit this vulnerability by repeatedly issuing a Telnet session to the NX-OS device, causing the login process to reset. An exploit could allow the attacker to cause the login process of the NX-OS device to reset repeatedly.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker would need to start a Telnet session with the targeted device. This requirement may decrease the likelihood of a successful exploit depending on how the targeted device is configured.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
cisconx_osMatch4.1\(2\)e1
OR
cisconx_osMatch6.0\(2\)n2
OR
cisconx_osMatch6.2
OR
cisconx_osMatch7.0
OR
cisconexus_1000vMatchanynexus_1000v
OR
cisconx_osMatch4.1\(2\)e1\(1f\)
OR
cisconx_osMatch6.0\(2\)n2\(2\)
OR
cisconx_osMatch6.2\(12\)
OR
cisconx_osMatch7.0\(3\)
OR
cisconexus_1000vMatch1000v_switchnexus_1000v
VendorProductVersionCPE
cisconx_os4.1(2)e1cpe:2.3:o:cisco:nx_os:4.1\(2\)e1:*:*:*:*:*:*:*
cisconx_os6.0(2)n2cpe:2.3:o:cisco:nx_os:6.0\(2\)n2:*:*:*:*:*:*:*
cisconx_os6.2cpe:2.3:o:cisco:nx_os:6.2:*:*:*:*:*:*:*
cisconx_os7.0cpe:2.3:o:cisco:nx_os:7.0:*:*:*:*:*:*:*
cisconexus_1000vanycpe:2.3:h:cisco:nexus_1000v:any:*:*:*:*:nexus_1000v:*:*
cisconx_os4.1(2)e1(1f)cpe:2.3:o:cisco:nx_os:4.1\(2\)e1\(1f\):*:*:*:*:*:*:*
cisconx_os6.0(2)n2(2)cpe:2.3:o:cisco:nx_os:6.0\(2\)n2\(2\):*:*:*:*:*:*:*
cisconx_os6.2(12)cpe:2.3:o:cisco:nx_os:6.2\(12\):*:*:*:*:*:*:*
cisconx_os7.0(3)cpe:2.3:o:cisco:nx_os:7.0\(3\):*:*:*:*:*:*:*
cisconexus_1000v1000v_switchcpe:2.3:h:cisco:nexus_1000v:1000v_switch:*:*:*:*:nexus_1000v:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

65.8%

Related for CISCO-SA-20150610-CVE-2015-0775