ID

VAR-201610-0368


CVE

CVE-2015-6393


TITLE

Cisco NX-OS Denial of Service Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2016-09439 // CNNVD: CNNVD-201610-084

DESCRIPTION

Cisco NX-OS 4.1 through 7.3 and 11.0 through 11.2 on Nexus 2000, 3000, 3500, 5000, 5500, 5600, 6000, 7000, 7700, and 9000 devices allows remote attackers to cause a denial of service (device crash) via malformed IPv4 DHCP packets to the DHCPv4 relay agent, aka Bug IDs CSCuq39250, CSCus21733, CSCus21739, CSCut76171, and CSCux67182. plural Cisco Nexus Run on device Cisco NX-OS There is a service disruption ( Device crash ) There are vulnerabilities that are put into a state. Cisco NX-OSonNexus2000, etc. is a set of operating systems running on Nexus2000 and other devices from Cisco. A denial of service vulnerability exists in the actual process of the DHCPv4 relay agent in Cisco NX-OSS versions 4.1 to 7.3 and 11.0 to 11.2. collapse). Successful exploits may allow the attacker to crash the affected application resulting in denial-of-service condition. This issue is being tracked by Cisco bug IDs CSCuq39250,CSCus21733,CSCus21739,CSCut76171 and CSCux67182. The following products running Cisco NX-OS Software are affected: Cisco Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 600 Switches 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in Application Centric Infrastructure mode, Nexus 9000 Series Switches in NX-OS mode

Trust: 2.61

sources: NVD: CVE-2015-6393 // JVNDB: JVNDB-2015-007272 // CNVD: CNVD-2016-09439 // BID: 93419 // VULHUB: VHN-84354 // VULMON: CVE-2015-6393

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-09439

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.1\(4\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(5\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(3.78\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(9\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(0\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(7\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2.\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.1\(0\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(8a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(5\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.2\(0\)n1\(0.1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(2b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n1\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.1\(0\)n1\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(8\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(14\)s1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(7\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(4a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n1\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(1b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1c\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(5a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(4\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(12\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)n1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(5\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.1.\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(6b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(10\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n2\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)n2\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.1\(3\)n1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.0\(2\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2\(8a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.1\(2\)i3\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:11.0 to 11.2

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:4.1 to 7.3

Trust: 0.8

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:5000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switches in nx-os modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switches in application centric infrastructure modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:nx-os softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switches in nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switches in aci modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:56000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:55000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:20000

Trust: 0.3

sources: CNVD: CNVD-2016-09439 // BID: 93419 // JVNDB: JVNDB-2015-007272 // CNNVD: CNNVD-201610-084 // NVD: CVE-2015-6393

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6393
value: HIGH

Trust: 1.0

NVD: CVE-2015-6393
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-09439
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-084
value: HIGH

Trust: 0.6

VULHUB: VHN-84354
value: HIGH

Trust: 0.1

VULMON: CVE-2015-6393
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6393
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-09439
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84354
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-6393
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-09439 // VULHUB: VHN-84354 // VULMON: CVE-2015-6393 // JVNDB: JVNDB-2015-007272 // CNNVD: CNNVD-201610-084 // NVD: CVE-2015-6393

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-84354 // JVNDB: JVNDB-2015-007272 // NVD: CVE-2015-6393

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-084

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201610-084

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007272

PATCH

title:cisco-sa-20161005-dhcp2url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp2

Trust: 0.8

title:Patch for Cisco NX-OS Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/82464

Trust: 0.6

title:Cisco NX-OS Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64512

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-warns-of-critical-flaws-in-nexus-switches/121164/

Trust: 0.1

sources: CNVD: CNVD-2016-09439 // VULMON: CVE-2015-6393 // JVNDB: JVNDB-2015-007272 // CNNVD: CNNVD-201610-084

EXTERNAL IDS

db:NVDid:CVE-2015-6393

Trust: 3.5

db:BIDid:93419

Trust: 2.1

db:SECTRACKid:1036949

Trust: 1.8

db:JVNDBid:JVNDB-2015-007272

Trust: 0.8

db:CNNVDid:CNNVD-201610-084

Trust: 0.7

db:CNVDid:CNVD-2016-09439

Trust: 0.6

db:VULHUBid:VHN-84354

Trust: 0.1

db:VULMONid:CVE-2015-6393

Trust: 0.1

sources: CNVD: CNVD-2016-09439 // VULHUB: VHN-84354 // VULMON: CVE-2015-6393 // BID: 93419 // JVNDB: JVNDB-2015-007272 // CNNVD: CNNVD-201610-084 // NVD: CVE-2015-6393

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161005-dhcp2

Trust: 2.7

url:http://www.securityfocus.com/bid/93419

Trust: 1.9

url:http://www.securitytracker.com/id/1036949

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6393

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6393

Trust: 0.8

url:http://securitytracker.com/id/1036949

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-warns-of-critical-flaws-in-nexus-switches/121164/

Trust: 0.1

sources: CNVD: CNVD-2016-09439 // VULHUB: VHN-84354 // VULMON: CVE-2015-6393 // BID: 93419 // JVNDB: JVNDB-2015-007272 // CNNVD: CNNVD-201610-084 // NVD: CVE-2015-6393

CREDITS

Cisco

Trust: 0.3

sources: BID: 93419

SOURCES

db:CNVDid:CNVD-2016-09439
db:VULHUBid:VHN-84354
db:VULMONid:CVE-2015-6393
db:BIDid:93419
db:JVNDBid:JVNDB-2015-007272
db:CNNVDid:CNNVD-201610-084
db:NVDid:CVE-2015-6393

LAST UPDATE DATE

2024-11-23T23:09:11.087000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-09439date:2016-10-19T00:00:00
db:VULHUBid:VHN-84354date:2017-07-30T00:00:00
db:VULMONid:CVE-2015-6393date:2017-07-30T00:00:00
db:BIDid:93419date:2016-10-10T05:02:00
db:JVNDBid:JVNDB-2015-007272date:2016-10-13T00:00:00
db:CNNVDid:CNNVD-201610-084date:2016-10-10T00:00:00
db:NVDid:CVE-2015-6393date:2024-11-21T02:34:54.953

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-09439date:2016-10-19T00:00:00
db:VULHUBid:VHN-84354date:2016-10-06T00:00:00
db:VULMONid:CVE-2015-6393date:2016-10-06T00:00:00
db:BIDid:93419date:2016-10-05T00:00:00
db:JVNDBid:JVNDB-2015-007272date:2016-10-13T00:00:00
db:CNNVDid:CNNVD-201610-084date:2016-10-10T00:00:00
db:NVDid:CVE-2015-6393date:2016-10-06T10:59:01.477