ID

VAR-201505-0190


CVE

CVE-2015-0746


TITLE

Cisco Access Control Server of REST API Denial of service in Japan (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-002776

DESCRIPTION

The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022. Vendors report this vulnerability Bug ID CSCut62022 Published as. Supplementary information : CWE Vulnerability types by CWE-254: Security Features ( Security features ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlDenial of service due to many requests sent by third parties (API Stop ) May be in a state. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. The solution supports certification revocation list (CRL), device access permission setting and user profile verification, etc

Trust: 1.98

sources: NVD: CVE-2015-0746 // JVNDB: JVNDB-2015-002776 // BID: 74771 // VULHUB: VHN-78692

AFFECTED PRODUCTS

vendor:ciscomodel:secure access control serverscope:eqversion:5.5\(0.46.2\)

Trust: 1.6

vendor:ciscomodel:secure access control server softwarescope:eqversion:5.5 (0.46.2)

Trust: 0.8

vendor:ciscomodel:access control serverscope:eqversion:5.5(0.46.2)

Trust: 0.3

sources: BID: 74771 // JVNDB: JVNDB-2015-002776 // CNNVD: CNNVD-201505-461 // NVD: CVE-2015-0746

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0746
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0746
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201505-461
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78692
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0746
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-78692
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-78692 // JVNDB: JVNDB-2015-002776 // CNNVD: CNNVD-201505-461 // NVD: CVE-2015-0746

PROBLEMTYPE DATA

problemtype:CWE-254

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-78692 // JVNDB: JVNDB-2015-002776 // NVD: CVE-2015-0746

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-461

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 74771

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002776

PATCH

title:38946url:http://tools.cisco.com/security/center/viewAlert.x?alertId=38946

Trust: 0.8

sources: JVNDB: JVNDB-2015-002776

EXTERNAL IDS

db:NVDid:CVE-2015-0746

Trust: 2.8

db:SECTRACKid:1032387

Trust: 1.1

db:JVNDBid:JVNDB-2015-002776

Trust: 0.8

db:CNNVDid:CNNVD-201505-461

Trust: 0.7

db:BIDid:74771

Trust: 0.4

db:VULHUBid:VHN-78692

Trust: 0.1

sources: VULHUB: VHN-78692 // BID: 74771 // JVNDB: JVNDB-2015-002776 // CNNVD: CNNVD-201505-461 // NVD: CVE-2015-0746

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38946

Trust: 2.0

url:http://www.securitytracker.com/id/1032387

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0746

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0746

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-78692 // BID: 74771 // JVNDB: JVNDB-2015-002776 // CNNVD: CNNVD-201505-461 // NVD: CVE-2015-0746

CREDITS

Cisco

Trust: 0.3

sources: BID: 74771

SOURCES

db:VULHUBid:VHN-78692
db:BIDid:74771
db:JVNDBid:JVNDB-2015-002776
db:CNNVDid:CNNVD-201505-461
db:NVDid:CVE-2015-0746

LAST UPDATE DATE

2024-11-23T21:54:58.552000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-78692date:2016-04-06T00:00:00
db:BIDid:74771date:2015-05-21T00:00:00
db:JVNDBid:JVNDB-2015-002776date:2015-05-25T00:00:00
db:CNNVDid:CNNVD-201505-461date:2015-05-22T00:00:00
db:NVDid:CVE-2015-0746date:2024-11-21T02:23:38.673

SOURCES RELEASE DATE

db:VULHUBid:VHN-78692date:2015-05-22T00:00:00
db:BIDid:74771date:2015-05-21T00:00:00
db:JVNDBid:JVNDB-2015-002776date:2015-05-25T00:00:00
db:CNNVDid:CNNVD-201505-461date:2015-05-22T00:00:00
db:NVDid:CVE-2015-0746date:2015-05-22T00:59:00.097