Lucene search

K
nvd[email protected]NVD:CVE-2015-0649
HistoryMar 26, 2015 - 10:59 a.m.

CVE-2015-0649

2015-03-2610:59:14
CWE-20
web.nvd.nist.gov
5

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

56.2%

Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514.

Affected configurations

Nvd
Node
ciscoiosMatch12.2\(33\)ird1
OR
ciscoiosMatch12.2\(33\)ire3
OR
ciscoiosMatch12.2\(33\)sxi4b
OR
ciscoiosMatch12.2\(44\)sq1
OR
ciscoiosMatch12.2\(52\)se
OR
ciscoiosMatch12.2\(52\)se1
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)se7
OR
ciscoiosMatch12.2\(55\)se8
OR
ciscoiosMatch12.2\(55\)se9
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch12.4\(25e\)jam1
OR
ciscoiosMatch12.4\(25e\)jap1m
OR
ciscoiosMatch12.4\(25e\)jaz1
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey1
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(2\)eb
OR
ciscoiosMatch15.0\(2\)ed1
OR
ciscoiosMatch15.0\(2\)ey
OR
ciscoiosMatch15.0\(2\)ey1
OR
ciscoiosMatch15.0\(2\)ey2
OR
ciscoiosMatch15.0\(2\)ey3
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(2\)se1
OR
ciscoiosMatch15.0\(2\)se2
OR
ciscoiosMatch15.0\(2\)se3
OR
ciscoiosMatch15.0\(2\)se4
OR
ciscoiosMatch15.0\(2\)se5
OR
ciscoiosMatch15.0\(2\)se6
OR
ciscoiosMatch15.0\(2\)se7
OR
ciscoiosMatch15.2\(1\)ex
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2\)jb1
OR
ciscoiosMatch15.3\(2\)s2
OR
ciscoiosMatch15.3\(3\)ja1n
OR
ciscoiosMatch15.3\(3\)jab1
OR
ciscoiosMatch15.3\(3\)jn
OR
ciscoiosMatch15.3\(3\)jnb
VendorProductVersionCPE
ciscoios12.2(33)ird1cpe:2.3:o:cisco:ios:12.2\(33\)ird1:*:*:*:*:*:*:*
ciscoios12.2(33)ire3cpe:2.3:o:cisco:ios:12.2\(33\)ire3:*:*:*:*:*:*:*
ciscoios12.2(33)sxi4bcpe:2.3:o:cisco:ios:12.2\(33\)sxi4b:*:*:*:*:*:*:*
ciscoios12.2(44)sq1cpe:2.3:o:cisco:ios:12.2\(44\)sq1:*:*:*:*:*:*:*
ciscoios12.2(52)secpe:2.3:o:cisco:ios:12.2\(52\)se:*:*:*:*:*:*:*
ciscoios12.2(52)se1cpe:2.3:o:cisco:ios:12.2\(52\)se1:*:*:*:*:*:*:*
ciscoios12.2(55)secpe:2.3:o:cisco:ios:12.2\(55\)se:*:*:*:*:*:*:*
ciscoios12.2(55)se3cpe:2.3:o:cisco:ios:12.2\(55\)se3:*:*:*:*:*:*:*
ciscoios12.2(55)se4cpe:2.3:o:cisco:ios:12.2\(55\)se4:*:*:*:*:*:*:*
ciscoios12.2(55)se5cpe:2.3:o:cisco:ios:12.2\(55\)se5:*:*:*:*:*:*:*
Rows per page:
1-10 of 451

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.6

Confidence

High

EPSS

0.002

Percentile

56.2%