fkie_cve-2015-0647
Vulnerability from fkie_nvd
Published
2015-03-26 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) UDP packets, aka Bug ID CSCum98371.
Impacted products
Vendor Product Version
cisco ios 12.2\(33\)ird1
cisco ios 12.2\(33\)ire3
cisco ios 12.2\(33\)sxi4b
cisco ios 12.2\(44\)ex
cisco ios 12.2\(44\)ex1
cisco ios 12.2\(44\)sq1
cisco ios 12.2\(46\)se
cisco ios 12.2\(46\)se1
cisco ios 12.2\(46\)se2
cisco ios 12.2\(50\)se
cisco ios 12.2\(50\)se1
cisco ios 12.2\(50\)se2
cisco ios 12.2\(50\)se3
cisco ios 12.2\(50\)se4
cisco ios 12.2\(50\)se5
cisco ios 12.2\(52\)se
cisco ios 12.2\(52\)se1
cisco ios 12.2\(55\)se
cisco ios 12.2\(55\)se3
cisco ios 12.2\(55\)se4
cisco ios 12.2\(55\)se5
cisco ios 12.2\(55\)se6
cisco ios 12.2\(55\)se7
cisco ios 12.2\(55\)se8
cisco ios 12.2\(55\)se9
cisco ios 12.2\(58\)se2
cisco ios 12.4\(25e\)jam1
cisco ios 12.4\(25e\)jap1m
cisco ios 12.4\(25e\)jaz1
cisco ios 15.0\(1\)ey
cisco ios 15.0\(1\)ey1
cisco ios 15.0\(1\)ey2
cisco ios 15.0\(2\)eb
cisco ios 15.0\(2\)ed1
cisco ios 15.0\(2\)ey
cisco ios 15.0\(2\)ey1
cisco ios 15.0\(2\)ey2
cisco ios 15.0\(2\)ey3
cisco ios 15.0\(2\)se
cisco ios 15.0\(2\)se1
cisco ios 15.0\(2\)se2
cisco ios 15.0\(2\)se3
cisco ios 15.0\(2\)se4
cisco ios 15.0\(2\)se5
cisco ios 15.0\(2\)se6
cisco ios 15.0\(2\)se7
cisco ios 15.2\(1\)ex
cisco ios 15.2\(1\)ey
cisco ios 15.2\(2\)e1
cisco ios 15.2\(2\)jb1
cisco ios 15.3\(2\)s2
cisco ios 15.3\(3\)ja
cisco ios 15.3\(3\)ja1
cisco ios 15.3\(3\)ja1m
cisco ios 15.3\(3\)ja1n
cisco ios 15.3\(3\)jaa
cisco ios 15.3\(3\)jab
cisco ios 15.3\(3\)jab1
cisco ios 15.3\(3\)jnb



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)ird1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA00878-FA42-4234-B3CD-F2F07F7CE9EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)ire3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B785F54A-DD27-4422-8F25-0A6EB3E36EEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4b:*:*:*:*:*:*:*",
              "matchCriteriaId": "95470E1A-2FEC-41DA-8259-EE4F890A32B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "E632468F-4B62-4937-8CA6-5B8023451F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C853E612-2C4B-4595-AD6F-22E34B68C69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq1:*:*:*:*:*:*:*",
              "matchCriteriaId": "742DA70E-6FF9-451D-9E62-F81EFB0BEB6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E61C16-55F9-4054-8CC2-38D5197A1FDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49E8D759-07E9-49DB-B8EB-A9C06A8D8031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EF0685-7BEF-4F84-902C-DFE533CD2F34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F114FD7-F62C-4A24-9CE6-C9A7136465F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "892F72BE-B65F-4271-9042-3B459DFBB43C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7715D0D0-E8B2-444A-A590-7B5B0BFA713F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B526DE1-EEA7-47E4-B291-09C02F018A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "5898745E-C1D3-4D0E-8476-2EEAA4327B5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "887C5632-F3F7-4EDB-A065-D81F64A9B15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
              "matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
              "matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30FFBD57-E751-42C8-AE89-CD2073F45688",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jap1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D3B067-46F9-460B-A3EB-7FCA3DDA7E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CA75FF-8C2E-4D9C-BE57-34EF801C28D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)eb:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FCA457-9074-4876-A21A-144F03CD6450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D3C419-D1FF-45E8-A5B1-AFFC59567478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
              "matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
              "matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
              "matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
              "matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E92C269-3C17-4C9D-970F-E9C8EE709ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)jb1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15A69BF-50B6-42BE-9F44-7A7EBA28CC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B7E5969-E55B-4EBF-ADDE-8A969174E03D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja:*:*:*:*:*:*:*",
              "matchCriteriaId": "C57A83D0-E043-4294-A61D-730FAE30CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71493AA2-49E9-4FF5-AC29-DC2426973EC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E9625-A8CF-4D0F-BB0D-9FB91391D977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DAE7DA-E0D3-4434-AD75-C8894D939A83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab:*:*:*:*:*:*:*",
              "matchCriteriaId": "915E4321-D52D-4C16-8821-ED16529C9090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBEF7B94-3510-48FA-B783-1BF1C23C2C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC3CD43-F30A-484B-9285-D925C1262212",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) UDP packets, aka Bug ID CSCum98371."
    },
    {
      "lang": "es",
      "value": "Cisco IOS 12.2, 12.4, 15.0, 15.2, y 15.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes UDP de Common Industrial Protocol (CIP) malformados, tambi\u00e9n conocido como Bug ID CSCum98371."
    }
  ],
  "id": "CVE-2015-0647",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-03-26T10:59:12.473",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…