ID

VAR-201502-0157


CVE

CVE-2015-0633


TITLE

C-Series Run on the server Cisco Unified Computing System of Integrated Management Controller Vulnerable to access restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2015-001628

DESCRIPTION

The Integrated Management Controller (IMC) in Cisco Unified Computing System (UCS) 1.4(7h) and earlier on C-Series servers allows remote attackers to bypass intended access restrictions by sending crafted DHCP response packets on the local network, aka Bug ID CSCuf52876. Cisco Unified Computing System C-Series are prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuf52876. There is a security vulnerability in IMC in Cisco UCS 1.4(7h) and earlier versions of C-Series servers

Trust: 2.34

sources: NVD: CVE-2015-0633 // JVNDB: JVNDB-2015-001628 // BID: 85711 // BID: 72760 // VULHUB: VHN-78579 // VULMON: CVE-2015-0633

AFFECTED PRODUCTS

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(1c\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(5h\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(5g\)2

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(6d\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(5j\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(7h\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(7b\)1

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(2\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(7c\)1

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(4a\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3c\)1

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(5e\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(5g\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3k\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3p\)5

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3p\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(5b\)1

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3s\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(4a\)1

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3c\)2

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(3j\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:1.4\(6c\)

Trust: 1.0

vendor:ciscomodel:c200-m1scope: - version: -

Trust: 0.8

vendor:ciscomodel:c200-m2scope: - version: -

Trust: 0.8

vendor:ciscomodel:c210-m2scope: - version: -

Trust: 0.8

vendor:ciscomodel:c22-m3scope: - version: -

Trust: 0.8

vendor:ciscomodel:c220-m3scope: - version: -

Trust: 0.8

vendor:ciscomodel:c220-m4scope: - version: -

Trust: 0.8

vendor:ciscomodel:c24-m3scope: - version: -

Trust: 0.8

vendor:ciscomodel:c240-m3scope: - version: -

Trust: 0.8

vendor:ciscomodel:c240-m4scope: - version: -

Trust: 0.8

vendor:ciscomodel:c250-m1scope: - version: -

Trust: 0.8

vendor:ciscomodel:c250-m2scope: - version: -

Trust: 0.8

vendor:ciscomodel:c260-m2scope: - version: -

Trust: 0.8

vendor:ciscomodel:c3160scope: - version: -

Trust: 0.8

vendor:ciscomodel:c420-m2scope: - version: -

Trust: 0.8

vendor:ciscomodel:c420-m3scope: - version: -

Trust: 0.8

vendor:ciscomodel:c460-m1scope: - version: -

Trust: 0.8

vendor:ciscomodel:c460-m2scope: - version: -

Trust: 0.8

vendor:ciscomodel:c460-m4scope: - version: -

Trust: 0.8

vendor:ciscomodel:unified computing system softwarescope:lteversion:1.4(7h)

Trust: 0.8

vendor:ciscomodel:unified computing system 2.2 ascope: - version: -

Trust: 0.3

sources: BID: 85711 // JVNDB: JVNDB-2015-001628 // CNNVD: CNNVD-201502-457 // NVD: CVE-2015-0633

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0633
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0633
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201502-457
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78579
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-0633
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0633
severity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-78579
severity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:L/AU:N/C:N/I:P/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-78579 // VULMON: CVE-2015-0633 // JVNDB: JVNDB-2015-001628 // CNNVD: CNNVD-201502-457 // NVD: CVE-2015-0633

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78579 // JVNDB: JVNDB-2015-001628 // NVD: CVE-2015-0633

THREAT TYPE

network

Trust: 0.6

sources: BID: 85711 // BID: 72760

TYPE

Failure to Handle Exceptional Conditions

Trust: 0.6

sources: BID: 85711 // BID: 72760

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001628

PATCH

title:Cisco UCS C-Series Integrated Management Controller Denial of Service Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0633

Trust: 0.8

title:37575url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37575

Trust: 0.8

sources: JVNDB: JVNDB-2015-001628

EXTERNAL IDS

db:NVDid:CVE-2015-0633

Trust: 3.2

db:BIDid:72760

Trust: 2.1

db:BIDid:85711

Trust: 2.1

db:SECTRACKid:1031796

Trust: 1.8

db:JVNDBid:JVNDB-2015-001628

Trust: 0.8

db:CNNVDid:CNNVD-201502-457

Trust: 0.7

db:VULHUBid:VHN-78579

Trust: 0.1

db:VULMONid:CVE-2015-0633

Trust: 0.1

sources: VULHUB: VHN-78579 // VULMON: CVE-2015-0633 // BID: 85711 // BID: 72760 // JVNDB: JVNDB-2015-001628 // CNNVD: CNNVD-201502-457 // NVD: CVE-2015-0633

REFERENCES

url:http://www.securityfocus.com/bid/85711

Trust: 2.5

url:http://www.securityfocus.com/bid/72760

Trust: 1.8

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0633

Trust: 1.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37575

Trust: 1.8

url:http://www.securitytracker.com/id/1031796

Trust: 1.8

url:http://www.cisco.com/

Trust: 1.2

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151210-ucs

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0633

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0633

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-78579 // VULMON: CVE-2015-0633 // BID: 85711 // BID: 72760 // JVNDB: JVNDB-2015-001628 // CNNVD: CNNVD-201502-457 // NVD: CVE-2015-0633

CREDITS

Cisco

Trust: 1.2

sources: BID: 85711 // BID: 72760 // CNNVD: CNNVD-201502-457

SOURCES

db:VULHUBid:VHN-78579
db:VULMONid:CVE-2015-0633
db:BIDid:85711
db:BIDid:72760
db:JVNDBid:JVNDB-2015-001628
db:CNNVDid:CNNVD-201502-457
db:NVDid:CVE-2015-0633

LAST UPDATE DATE

2024-11-23T21:54:46.072000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-78579date:2019-04-15T00:00:00
db:VULMONid:CVE-2015-0633date:2019-04-15T00:00:00
db:BIDid:85711date:2019-04-12T19:00:00
db:BIDid:72760date:2015-03-19T07:34:00
db:JVNDBid:JVNDB-2015-001628date:2015-02-27T00:00:00
db:CNNVDid:CNNVD-201502-457date:2019-04-19T00:00:00
db:NVDid:CVE-2015-0633date:2024-11-21T02:23:26.437

SOURCES RELEASE DATE

db:VULHUBid:VHN-78579date:2015-02-26T00:00:00
db:VULMONid:CVE-2015-0633date:2015-02-26T00:00:00
db:BIDid:85711date:2015-12-10T00:00:00
db:BIDid:72760date:2015-02-24T00:00:00
db:JVNDBid:JVNDB-2015-001628date:2015-02-27T00:00:00
db:CNNVDid:CNNVD-201502-457date:2015-02-28T00:00:00
db:NVDid:CVE-2015-0633date:2015-02-26T01:59:00.063