Cisco IOS 12.2 on uBR10000 Performance Routing Engine docsIfMCmtsMib resource management

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic was found in Cisco IOS 12.2 on uBR10000. Impacted is an unknown function of the component Performance Routing Engine. Executing a manipulation of the argument docsIfMCmtsMib as part of SNMP Request can lead to resource management. This vulnerability appears as CVE-2015-4204. There is no available exploit. The application of restrictive firewalling is recommended.
Details
A vulnerability was found in Cisco IOS 12.2 on uBR10000 (Router Operating System). It has been declared as problematic. This vulnerability affects an unknown function of the component Performance Routing Engine. The manipulation of the argument docsIfMCmtsMib as part of a SNMP Request leads to a resource management vulnerability. The CWE definition for the vulnerability is CWE-399. As an impact it is known to affect availability. CVE summarizes:
Memory leak in Cisco IOS 12.2 in the Performance Routing Engine (PRE) module on uBR10000 devices allows remote authenticated users to cause a denial of service (memory consumption or PXF process crash) by sending docsIfMCmtsMib SNMP requests quickly, aka Bug ID CSCue65051.
The weakness was presented 06/23/2015 with Cisco as CSCue65051 as not defined advisory (Website). The advisory is shared for download at tools.cisco.com. This vulnerability was named CVE-2015-4204 since 06/04/2015. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available.
It is possible to mitigate the problem by applying the configuration setting no snmp-server.Proper firewalling of udp/161 (snmp) is able to address this issue. The best possible mitigation is suggested to be applying a restrictive firewalling.
The vulnerability is also documented in the databases at SecurityFocus (BID 75337†) and Vulnerability Center (SBV-50672†). See VDB-76047 and VDB-76046 for similar entries. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.3
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Config: no snmp-server
Firewalling: 🔍
Timeline
06/04/2015 🔍06/22/2015 🔍
06/22/2015 🔍
06/23/2015 🔍
06/23/2015 🔍
06/23/2015 🔍
06/24/2015 🔍
05/21/2022 🔍
Sources
Vendor: cisco.comAdvisory: CSCue65051
Organization: Cisco
Status: Not defined
CVE: CVE-2015-4204 (🔍)
GCVE (CVE): GCVE-0-2015-4204
GCVE (VulDB): GCVE-100-76048
SecurityFocus: 75337 - Cisco IOS Software CVE-2015-4204 Denial of Service Vulnerability
SecurityTracker: 1032692
Vulnerability Center: 50672 - Cisco IOS on uBR10000 Series Routers Remote DoS due to a Memory Leak, Medium
See also: 🔍
Entry
Created: 06/24/2015 09:54Updated: 05/21/2022 14:44
Changes: 06/24/2015 09:54 (58), 07/01/2017 08:06 (10), 05/21/2022 14:44 (3)
Complete: 🔍
Cache ID: 216:B9E:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.