| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.16 |
Summary
A vulnerability, which was classified as problematic, was found in Cisco IOS and IOS XE. This issue affects some unknown processing of the component Radius. Such manipulation leads to data processing. This vulnerability is referenced as CVE-2015-0598. No exploit is available. You should upgrade the affected component.
Details
A vulnerability was found in Cisco IOS and IOS XE (Router Operating System) (affected version not known) and classified as problematic. Affected by this issue is some unknown functionality of the component Radius. The manipulation with an unknown input leads to a data processing vulnerability. Using CWE to declare the problem leads to CWE-19. Impacted is availability. CVE summarizes:
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.
The weakness was published 03/05/2015 with Cisco as CSCur84322 as confirmed security notice (Website). The advisory is shared for download at tools.cisco.com. This vulnerability is handled as CVE-2015-0598 since 01/07/2015. The attack may be launched remotely. A simple authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 316051 (Cisco IOS Software Crafted RADIUS Packet Denial of Service Vulnerability (CVE-2015-0598)).
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (101345), SecurityFocus (BID 72967†), SecurityTracker (ID 1031842†) and Vulnerability Center (SBV-48898†). Similar entries are available at VDB-69261 and VDB-69267. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.7
VulDB Base Score: 6.5
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Data processingCWE: CWE-19
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
01/07/2015 🔍03/05/2015 🔍
03/05/2015 🔍
03/05/2015 🔍
03/05/2015 🔍
03/06/2015 🔍
03/06/2015 🔍
03/08/2015 🔍
12/02/2024 🔍
Sources
Vendor: cisco.comAdvisory: CSCur84322
Organization: Cisco
Status: Confirmed
CVE: CVE-2015-0598 (🔍)
GCVE (CVE): GCVE-0-2015-0598
GCVE (VulDB): GCVE-100-69260
X-Force: 101345 - Cisco IOS and Cisco IOS XE RADIUS denial of service
SecurityFocus: 72967 - Cisco IOS and IOS XE Software CVE-2015-0598 Denial of Service Vulnerability
SecurityTracker: 1031842 - Cisco IOS/IOS XE RADIUS Processing Flaw Lets Remote Authenticated Users Deny Service
Vulnerability Center: 48898 - Cisco IOS and IOS XE Remote DoS via a Crafted IPv6 Attributes in Access-Accept Packets, Medium
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 03/06/2015 09:58Updated: 12/02/2024 10:25
Changes: 03/06/2015 09:58 (67), 06/22/2017 09:14 (3), 12/02/2024 10:25 (18)
Complete: 🔍
Cache ID: 216:039:103

No comments yet. Languages: en.
Please log in to comment.