// For flags

CVE-2015-0608

 

Severity Score

7.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Race condition in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCul48736.

Condición de carrera en la implementación Measurement, Aggregation, y Correlation Engine (MACE) en Cisco IOS 15.4(2)T3 y anteriores permite a atacantes remotos causar una denegación de servicio (recarga del dispositivo) a través de trafico manipulado de la red que provoca el manejo incorrecto delos tiempos de la conmutación de procesos y de la conmutación de Cisco Express Forwarding (CEF), también conocido como Bug ID CSCul48736.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-01-07 CVE Reserved
  • 2015-02-12 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
<= 15.4\(2\)t3
Search vendor "Cisco" for product "Ios" and version " <= 15.4\(2\)t3"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(1\)t
Search vendor "Cisco" for product "Ios" and version "15.4\(1\)t"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(1\)t1
Search vendor "Cisco" for product "Ios" and version "15.4\(1\)t1"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(1\)t2
Search vendor "Cisco" for product "Ios" and version "15.4\(1\)t2"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(1\)t3
Search vendor "Cisco" for product "Ios" and version "15.4\(1\)t3"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(1\)t4
Search vendor "Cisco" for product "Ios" and version "15.4\(1\)t4"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(2\)t
Search vendor "Cisco" for product "Ios" and version "15.4\(2\)t"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(2\)t1
Search vendor "Cisco" for product "Ios" and version "15.4\(2\)t1"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4\(2\)t2
Search vendor "Cisco" for product "Ios" and version "15.4\(2\)t2"
-
Affected
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.4t
Search vendor "Cisco" for product "Ios" and version "15.4t"
-
Affected