| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.8 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, has been found in Cisco IOS and IOS XE. This impacts an unknown function of the component Radius. This manipulation causes resource management. The identification of this vulnerability is CVE-2015-0709. There is no exploit available. It is advisable to upgrade the affected component.
Details
A vulnerability was found in Cisco IOS and IOS XE (Router Operating System). It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Radius. The manipulation with an unknown input leads to a resource management vulnerability. The CWE definition for the vulnerability is CWE-399. As an impact it is known to affect availability. The summary by CVE is:
Cisco IOS 15.5S and IOS XE allow remote authenticated users to cause a denial of service (device crash) by leveraging knowledge of the RADIUS secret and sending crafted RADIUS packets, aka Bug ID CSCur21348.
The weakness was shared 04/29/2015 with Cisco as CSCur21348 as confirmed advisory (Website). It is possible to read the advisory at tools.cisco.com. This vulnerability is known as CVE-2015-0709 since 01/07/2015. The attack can be launched remotely. The successful exploitation needs a single authentication. The technical details are unknown and an exploit is not publicly available.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 43464 (Cisco IOS Software Crafted RADIUS Packet Denial of Service Vulnerability (Cisco-SA-20150428-CVE-2015-0709)).
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (102650), SecurityFocus (BID 74381†), SecurityTracker (ID 1032211†) and Vulnerability Center (SBV-49916†). The entry VDB-75138 is related to this item. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Affected
- Cisco IOS 15.5S
- Ciscio IOS XE
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 3.8
VulDB Base Score: 4.3
VulDB Temp Score: 3.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Timeline
01/07/2015 🔍04/28/2015 🔍
04/28/2015 🔍
04/28/2015 🔍
04/29/2015 🔍
04/29/2015 🔍
04/29/2015 🔍
04/29/2015 🔍
12/02/2024 🔍
Sources
Vendor: cisco.comAdvisory: CSCur21348
Organization: Cisco
Status: Confirmed
CVE: CVE-2015-0709 (🔍)
GCVE (CVE): GCVE-0-2015-0709
GCVE (VulDB): GCVE-100-75139
X-Force: 102650 - Cisco IOS and Cisco IOS XE RADIUS denial of service
SecurityFocus: 74381 - Cisco IOS and IOS XE Software CVE-2015-0709 Denial of Service Vulnerability
SecurityTracker: 1032211 - Cisco IOS/IOS-XE RADIUS Bug Lets Remote Users Deny Service
Vulnerability Center: 49916 - Cisco IOS 15.5S and 15.5(3)S Remote DoS via Malicious RADIUS Packets - CVE-2015-0709, Medium
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 04/29/2015 10:16Updated: 12/02/2024 04:22
Changes: 04/29/2015 10:16 (68), 06/27/2017 09:00 (3), 12/02/2024 04:22 (18)
Complete: 🔍
Cache ID: 216:9B2:103

No comments yet. Languages: en.
Please log in to comment.