CVE-2015-6359
 
Severity Score
6.1
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS 15.3(3)S0.1 on ASR devices mishandles internal tables, which allows remote attackers to cause a denial of service (memory consumption or device crash) via a flood of crafted ND messages, aka Bug ID CSCup28217.
La implementación del protocolo Neighbor Discovery (ND) en la pila IPv6 en Cisco IOS 15.3(3)S0.1 en dispositivos ASR no maneja adecuadamente las tablas internas, lo que permite a atacantes remotos causar una denegación de servicio (consumo de memoria o caída del dispositivo) a través de una inundación de mensajes ND manipulados, también conocido como Bug ID CSCup28217.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2015-08-17 CVE Reserved
- 2015-12-15 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/79200 | Vdb Entry | |
http://www.securitytracker.com/id/1034432 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151214-ios | 2016-12-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(4\)e Search vendor "Cisco" for product "Ios" and version "15.2\(4\)e" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(4\)pi Search vendor "Cisco" for product "Ios" and version "15.2\(4\)pi" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(4\)st Search vendor "Cisco" for product "Ios" and version "15.2\(4\)st" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(5\)st Search vendor "Cisco" for product "Ios" and version "15.2\(5\)st" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.3\(3\)s0.1 Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s0.1" | - |
Affected
|