ID

VAR-201610-0367


CVE

CVE-2015-6392


TITLE

plural Cisco Nexus Run on device Cisco NX-OS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-007285

DESCRIPTION

Cisco NX-OS 4.1 through 7.3 and 11.0 through 11.2 on Nexus 2000, 5000, 5500, 5600, 6000, 7000, 7700, and 9000 devices allows remote attackers to cause a denial of service (device crash) via crafted IPv4 DHCP packets to the (1) DHCPv4 relay agent or (2) smart relay agent, aka Bug IDs CSCuq24603, CSCur93159, CSCus21693, and CSCut76171. plural Cisco Nexus Run on device Cisco NX-OS There is a service disruption ( Device crash ) There are vulnerabilities that are put into a state. Cisco NX-OS is a data center level operating system. Enables an unauthenticated remote attacker to cause the affected device to refuse service. Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. This issue is being tracked by Cisco bug IDs CSCuq24603, CSCur93159, CSCus21693 and CSCut76171. Cisco NX-OS on Nexus 2000, etc. The following products running Cisco NX-OS Software are affected: Cisco Nexus 2000, 5000, 5500, 5600, 6000, 7000, 7700, 9000

Trust: 2.61

sources: NVD: CVE-2015-6392 // JVNDB: JVNDB-2015-007285 // CNVD: CNVD-2016-09010 // BID: 93406 // VULHUB: VHN-84353 // VULMON: CVE-2015-6392

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-09010

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:7.1\(0\)n1\(1a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:7.0\(4\)n1\(1\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(5\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(7\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(5a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(4\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:7.1\(0\)n1\(1b\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(6\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(1b\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(0\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(7\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2.\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(8a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(5\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.2\(0\)n1\(0.1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(2b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(3.78\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(14\)s1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:base

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(12\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(5\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(10\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(9\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1 to 7.2

Trust: 0.8

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:5000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switches in nx-os modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switches in application centric infrastructure modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:nx-os softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switches in nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switches in aci modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:56000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:55000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:20000

Trust: 0.3

sources: CNVD: CNVD-2016-09010 // BID: 93406 // JVNDB: JVNDB-2015-007285 // CNNVD: CNNVD-201610-085 // NVD: CVE-2015-6392

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6392
value: HIGH

Trust: 1.0

NVD: CVE-2015-6392
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-09010
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-085
value: HIGH

Trust: 0.6

VULHUB: VHN-84353
value: HIGH

Trust: 0.1

VULMON: CVE-2015-6392
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6392
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-09010
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84353
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-6392
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-09010 // VULHUB: VHN-84353 // VULMON: CVE-2015-6392 // JVNDB: JVNDB-2015-007285 // CNNVD: CNNVD-201610-085 // NVD: CVE-2015-6392

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-84353 // JVNDB: JVNDB-2015-007285 // NVD: CVE-2015-6392

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-085

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201610-085

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007285

PATCH

title:cisco-sa-20161005-dhcp1url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp1

Trust: 0.8

title:Patch for Cisco NX-OSSoftware Denial of Service Vulnerability (CNVD-2016-09010)url:https://www.cnvd.org.cn/patchInfo/show/82439

Trust: 0.6

title:Cisco NX-OS Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64513

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-warns-of-critical-flaws-in-nexus-switches/121164/

Trust: 0.1

sources: CNVD: CNVD-2016-09010 // VULMON: CVE-2015-6392 // JVNDB: JVNDB-2015-007285 // CNNVD: CNNVD-201610-085

EXTERNAL IDS

db:NVDid:CVE-2015-6392

Trust: 3.5

db:BIDid:93406

Trust: 2.1

db:SECTRACKid:1036948

Trust: 1.8

db:JVNDBid:JVNDB-2015-007285

Trust: 0.8

db:CNNVDid:CNNVD-201610-085

Trust: 0.7

db:CNVDid:CNVD-2016-09010

Trust: 0.6

db:VULHUBid:VHN-84353

Trust: 0.1

db:VULMONid:CVE-2015-6392

Trust: 0.1

sources: CNVD: CNVD-2016-09010 // VULHUB: VHN-84353 // VULMON: CVE-2015-6392 // BID: 93406 // JVNDB: JVNDB-2015-007285 // CNNVD: CNNVD-201610-085 // NVD: CVE-2015-6392

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161005-dhcp1

Trust: 2.7

url:http://www.securityfocus.com/bid/93406

Trust: 1.9

url:http://www.securitytracker.com/id/1036948

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6392

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6392

Trust: 0.8

url:http://securitytracker.com/id/1036948

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-warns-of-critical-flaws-in-nexus-switches/121164/

Trust: 0.1

sources: CNVD: CNVD-2016-09010 // VULHUB: VHN-84353 // VULMON: CVE-2015-6392 // BID: 93406 // JVNDB: JVNDB-2015-007285 // CNNVD: CNNVD-201610-085 // NVD: CVE-2015-6392

CREDITS

Cisco

Trust: 0.3

sources: BID: 93406

SOURCES

db:CNVDid:CNVD-2016-09010
db:VULHUBid:VHN-84353
db:VULMONid:CVE-2015-6392
db:BIDid:93406
db:JVNDBid:JVNDB-2015-007285
db:CNNVDid:CNNVD-201610-085
db:NVDid:CVE-2015-6392

LAST UPDATE DATE

2024-11-23T22:26:55.799000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-09010date:2016-10-17T00:00:00
db:VULHUBid:VHN-84353date:2017-07-30T00:00:00
db:VULMONid:CVE-2015-6392date:2017-07-30T00:00:00
db:BIDid:93406date:2016-10-10T05:02:00
db:JVNDBid:JVNDB-2015-007285date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-085date:2016-10-10T00:00:00
db:NVDid:CVE-2015-6392date:2024-11-21T02:34:54.800

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-09010date:2016-10-17T00:00:00
db:VULHUBid:VHN-84353date:2016-10-06T00:00:00
db:VULMONid:CVE-2015-6392date:2016-10-06T00:00:00
db:BIDid:93406date:2016-10-05T00:00:00
db:JVNDBid:JVNDB-2015-007285date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-085date:2016-10-10T00:00:00
db:NVDid:CVE-2015-6392date:2016-10-06T01:59:01.637