fkie_cve-2015-0658
Vulnerability from fkie_nvd
Published
2015-03-28 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | nx-os | 6.1\(2\) | |
| cisco | nx-os | 6.1\(3\) | |
| cisco | nx-os | 6.1\(4\) | |
| cisco | nx-os | 6.1\(4a\) | |
| cisco | nx-os | 6.2\(2\) | |
| cisco | nx-os | 6.2\(2a\) | |
| cisco | nx-os | 6.2\(6\) | |
| cisco | nx-os | 6.2\(6b\) | |
| cisco | nx-os | 6.2\(8\) | |
| cisco | nx-os | 6.2\(8a\) | |
| cisco | nx-os | 6.2\(8b\) | |
| cisco | nexus_7000 | * | |
| cisco | nexus_7700 | * | |
| cisco | nx-os | 6.0\(2\)n1\(1\) | |
| cisco | nx-os | 6.0\(2\)n1\(2\) | |
| cisco | nx-os | 6.0\(2\)n1\(2a\) | |
| cisco | nx-os | 6.0\(2\)n2\(1\) | |
| cisco | nx-os | 6.0\(2\)n2\(1b\) | |
| cisco | nx-os | 6.0\(2\)n2\(2\) | |
| cisco | nx-os | 6.0\(2\)n2\(3\) | |
| cisco | nx-os | 6.0\(2\)n2\(4\) | |
| cisco | nx-os | 6.0\(2\)n2\(5\) | |
| cisco | nx-os | 7.0\(0\)n1\(1\) | |
| cisco | nx-os | 7.0\(1\)n1\(1\) | |
| cisco | nx-os | 7.0\(2\)n1\(1\) | |
| cisco | nx-os | 7.0\(3\)n1\(1\) | |
| cisco | nexus_5010 | * | |
| cisco | nexus_5020 | * | |
| cisco | nexus_5548p | * | |
| cisco | nexus_5548up | * | |
| cisco | nexus_5596t | * | |
| cisco | nexus_5596up | * | |
| cisco | nexus_56128p | * | |
| cisco | nexus_5624q | * | |
| cisco | nexus_5648q | * | |
| cisco | nexus_5672up | * | |
| cisco | nexus_5696q | * | |
| cisco | nx-os | 6.0\(2\)n1\(2\) | |
| cisco | nx-os | 6.0\(2\)n1\(2a\) | |
| cisco | nx-os | 6.0\(2\)n2\(1\) | |
| cisco | nx-os | 6.0\(2\)n2\(1b\) | |
| cisco | nx-os | 6.0\(2\)n2\(2\) | |
| cisco | nx-os | 6.0\(2\)n2\(3\) | |
| cisco | nx-os | 6.0\(2\)n2\(4\) | |
| cisco | nx-os | 6.0\(2\)n2\(5\) | |
| cisco | nx-os | 7.0\(0\)n1\(1\) | |
| cisco | nx-os | 7.0\(1\)n1\(1\) | |
| cisco | nx-os | 7.0\(2\)n1\(1\) | |
| cisco | nx-os | 7.0\(3\)n1\(1\) | |
| cisco | nexus_6001 | * | |
| cisco | nexus_6004 | * | |
| cisco | nx-os | 6.1\(2\)i2\(1\) | |
| cisco | nx-os | 6.1\(2\)i2\(2\) | |
| cisco | nx-os | 6.1\(2\)i2\(2a\) | |
| cisco | nx-os | 6.1\(2\)i2\(2b\) | |
| cisco | nx-os | 6.1\(2\)i2\(3\) | |
| cisco | nx-os | 6.1\(2\)i3\(1\) | |
| cisco | nx-os | 6.1\(2\)i3\(2\) | |
| cisco | nx-os | 6.1\(2\)i3\(3\) | |
| cisco | nx-os | 11.0\(1b\) | |
| cisco | nx-os | 11.0\(1c\) | |
| cisco | nexus_93120tx | * | |
| cisco | nexus_93128tx | * | |
| cisco | nexus_9332pq | * | |
| cisco | nexus_9336pq_aci_spine | * | |
| cisco | nexus_9372px | * | |
| cisco | nexus_9372tx | * | |
| cisco | nexus_9396px | * | |
| cisco | nexus_9396tx | * | |
| cisco | nexus_9504 | * | |
| cisco | nexus_9508 | * | |
| cisco | nexus_9516 | * | |
| cisco | nx-os | 5.0\(3\)u3\(1\) | |
| cisco | nx-os | 5.0\(3\)u3\(2\) | |
| cisco | nx-os | 5.0\(3\)u3\(2a\) | |
| cisco | nx-os | 5.0\(3\)u3\(2b\) | |
| cisco | nx-os | 5.0\(3\)u4\(1\) | |
| cisco | nx-os | 5.0\(3\)u5\(1\) | |
| cisco | nx-os | 5.0\(3\)u5\(1a\) | |
| cisco | nx-os | 5.0\(3\)u5\(1b\) | |
| cisco | nx-os | 5.0\(3\)u5\(1c\) | |
| cisco | nx-os | 5.0\(3\)u5\(1d\) | |
| cisco | nx-os | 5.0\(3\)u5\(1e\) | |
| cisco | nx-os | 5.0\(3\)u5\(1f\) | |
| cisco | nx-os | 5.0\(3\)u5\(1g\) | |
| cisco | nx-os | 5.0\(3\)u5\(1h\) | |
| cisco | nx-os | 6.0\(2\)u1\(1\) | |
| cisco | nx-os | 6.0\(2\)u1\(1a\) | |
| cisco | nx-os | 6.0\(2\)u1\(2\) | |
| cisco | nx-os | 6.0\(2\)u1\(3\) | |
| cisco | nx-os | 6.0\(2\)u1\(4\) | |
| cisco | nx-os | 6.0\(2\)u2\(1\) | |
| cisco | nx-os | 6.0\(2\)u2\(2\) | |
| cisco | nx-os | 6.0\(2\)u2\(3\) | |
| cisco | nx-os | 6.0\(2\)u2\(4\) | |
| cisco | nx-os | 6.0\(2\)u2\(5\) | |
| cisco | nx-os | 6.0\(2\)u2\(6\) | |
| cisco | nx-os | 6.0\(2\)u3\(1\) | |
| cisco | nx-os | 6.0\(2\)u3\(2\) | |
| cisco | nx-os | 6.0\(2\)u3\(3\) | |
| cisco | nx-os | 6.0\(2\)u3\(4\) | |
| cisco | nx-os | 6.0\(2\)u3\(5\) | |
| cisco | nx-os | 6.0\(2\)u4\(1\) | |
| cisco | nx-os | 6.0\(2\)u4\(2\) | |
| cisco | nx-os | 6.0\(2\)u4\(3\) | |
| cisco | nx-os | 6.0\(2\)u5\(1\) | |
| cisco | nexus_3016 | * | |
| cisco | nexus_3048 | * | |
| cisco | nexus_3064 | * | |
| cisco | nexus_3132q | * | |
| cisco | nexus_3164q | - | |
| cisco | nexus_3172 | * | |
| cisco | nexus_3524 | * | |
| cisco | nexus_3548 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "35E48EE6-C498-4E13-AC5E-28F6B4391725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3B41075-01D1-4832-A025-07A378F2A5E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "858E4134-643C-422C-8441-5372F4BC25D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A12BFDB0-4B90-4EB6-9CBE-A7A33C57EA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FDE8EF9-47CF-451D-9570-3D369D74D44F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "55A760CE-5E63-4A6B-8DA3-A473BC3900E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0E738E86-B75F-48BF-9E76-C7DD470F3688",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68C6090F-0B05-46F0-8A67-928FE1C36D5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FBD345BD-83EF-4913-A0F3-74E52AD76BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "46B2B97B-DDB7-4208-BF1A-D10C8A075A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "317C8BE8-84DA-43D5-AE93-7E7DCDE6883E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16DE0FB3-1DC2-4BA4-BD26-FF6E7C06EC11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7700:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE36822-4657-457A-B260-BEEE914B5057",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C871A419-B769-46B2-956E-467BBE94F290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EACF481-3E4B-4580-8AE7-3D49790E0715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "698ABD3F-C9DE-4376-B57A-D05AEDCD9A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5010EDAE-67BB-4E23-B0F5-10096A7DAB54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84CF5114-731F-4BF4-83E0-9B095C34541C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4750621F-E7C5-4E6A-BC5F-232E75A454E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "08F35A63-9343-47D6-AB91-37AB148137E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CADBDD1D-DA17-40EE-8B23-81E9991387DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A623F8E1-B97B-41DD-947F-7E1B65DD6902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD613D8F-099C-43A1-BD29-A98250E1334A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "576B74DF-9527-4931-B1A3-8FEE1DB1AD99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA5B4FA9-E550-4C69-A4E7-A989BBCCF22E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "63949081-E2F3-4EB4-BABC-270AAB19EE78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_5010:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C498AF62-0B67-4CBE-B635-2665B7B6AB5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5020:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90564BCC-F093-4E48-8188-AB07B2F6A65D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E34A8EA1-170C-443B-8EE1-CBA6EB8B2465",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5548up:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B657BB8-4E6D-41B0-870A-3E973D2642A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5596t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1637A625-07C8-45E5-8896-591635821C87",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5596up:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFECF84E-3826-4DCC-8F1B-7A6FAFD9F07F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_56128p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD45884E-1573-48C2-98C0-3FC4A404CCD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5624q:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D163F5E-F5E9-4553-BA68-E7B965423E05",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5648q:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBB1AF7A-6FFA-4DB3-8CD9-324D0D15EBB2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5672up:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CBBD6CC-7EC0-4D49-BD27-436290398F9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_5696q:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD9B812-271E-4155-BAAD-DDC50808F014",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7EACF481-3E4B-4580-8AE7-3D49790E0715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "698ABD3F-C9DE-4376-B57A-D05AEDCD9A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5010EDAE-67BB-4E23-B0F5-10096A7DAB54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84CF5114-731F-4BF4-83E0-9B095C34541C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4750621F-E7C5-4E6A-BC5F-232E75A454E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "08F35A63-9343-47D6-AB91-37AB148137E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CADBDD1D-DA17-40EE-8B23-81E9991387DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A623F8E1-B97B-41DD-947F-7E1B65DD6902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD613D8F-099C-43A1-BD29-A98250E1334A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "576B74DF-9527-4931-B1A3-8FEE1DB1AD99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA5B4FA9-E550-4C69-A4E7-A989BBCCF22E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "63949081-E2F3-4EB4-BABC-270AAB19EE78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_6001:*:*:*:*:*:*:*:*",
"matchCriteriaId": "991C8B44-CD6D-4A86-BEDC-EEE4DF1C33E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_6004:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C7E0DD8-54BF-4C91-B163-288FEF443234",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1BB0F49B-85C0-4C52-82E0-C2683D43B553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9ABB647D-B91E-4C2F-9FBE-1C9AAB27E2D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "384B7337-1C2F-479E-BB2B-F31320D82EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9ED50316-7044-4757-9C51-5543BA5693A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1CB11917-C606-4025-A91A-596F7D47A311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69B757AE-83C8-4194-9BAE-DBECA2021597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB1A44C9-147B-4D1F-AB98-EB4F9F8C1C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "702EF8D5-1F3F-45EF-AC8D-BD5A9E46A78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C64CC640-B37D-4064-8946-B8CCCDE1A6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8983275-20C6-487E-A265-3836F06AB226",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_93120tx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4191D5D-2DAE-42E8-9DF8-54BF94F6357F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93128tx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22D2DC70-84C1-43B1-892F-CB42F97B4308",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9332pq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F85E999E-B350-42DF-85C2-9AD9B95143BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6E98BF-2B00-4F94-9643-E136AAA51A15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9372px:*:*:*:*:*:*:*:*",
"matchCriteriaId": "910E9554-5B27-4120-A2BA-6BC1DBD93B4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9372tx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3DE2807-88F4-4830-8C66-FA2694040012",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9396px:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47A47B73-31E2-4A02-9AA8-6450501A3B03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9396tx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42F184B8-36B2-47CA-97ED-8A50E8C55EAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9504:*:*:*:*:*:*:*:*",
"matchCriteriaId": "291ADF89-15B3-4405-A5A1-16DBCED41B5A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9508:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB1F31A-0068-4A7F-8019-8CE7E792529D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9516:*:*:*:*:*:*:*:*",
"matchCriteriaId": "444564EE-97FA-41E1-801E-1C38B853D321",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "641D651A-B85B-4E9E-BE92-35AFAE8A63A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7810F6FD-F58F-4121-9D30-8C5E3E163EFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09C38DCD-2A5F-4095-ABA4-02E95D93C358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103A4C19-0E91-45FC-9AA2-F40215FCF63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F61C03B-D7AB-468A-B092-158730FB3E0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F883AA8-CC44-4440-AB30-D7AC29C242F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7390B4D2-2121-4311-A798-337E8B777A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "924C6663-9EA0-4124-ACC6-0AFC649AEA6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3C559C83-FB34-4B1A-A6B3-1834D6CD022C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7F422D53-4FF4-43FB-8F62-D53393A8C038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7CFFFE88-17EA-4515-BF71-C0AB82957B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6EF14E5C-B776-4A04-A5CC-853CFF2816B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EF7E681A-F354-4093-84A9-5A357EAB1559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B627C66-CFE1-40B9-8264-392BB091EA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5BFA21F2-E2B2-49B6-9956-D6219D499F7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "52899164-992D-4736-B460-FDFB825DB7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8766DA4C-A25C-48D4-A6FC-2357200A9215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B6C48105-F73E-40C9-8CD9-B46C5319FB5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94F5B47A-023B-4415-8DB9-6829C5E72901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "618861BD-8FEE-4EF8-BFFB-A5BCBA8EA3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6459DD6B-6DC1-4C14-A8E7-4503ED5F69BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA600413-FC70-4776-99DF-180C96D4FD24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECC9066F-3082-48A0-BA52-9ED9420EA47A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "78611E25-E33E-4C88-A681-97B5A2A01B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "780B04ED-412E-441F-8717-D8F9257F5699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FC6A3647-2AF0-4D45-BCC9-24618B43ACBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD2AABBD-8680-4615-A4E2-B607CB1B0979",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "693F444B-FA34-489C-BB45-E9185DE47816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "13669043-3F12-4439-812F-6DE35F70B159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "58A8BDE0-2F73-4E0C-B73A-918DB3352067",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10BFAE68-01C5-4EF8-8B86-F470092E9034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6D02FC11-EB21-45CD-A070-89C4862240BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C67AE59-380A-402B-9B2A-F595E001637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C71ED401-6786-4AAE-A98F-BE4732256A7D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_3016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE8BF90-B19C-4EA7-ACF8-37AEF624C1EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3048:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7918D88F-AF51-42B1-8C8E-587D6714DEB8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3064:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7623D2B2-B37D-48BF-BB77-FF9FBB07D98F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3132q:*:*:*:*:*:*:*:*",
"matchCriteriaId": "133078DA-A6A7-41FC-AB28-BCE5B3600B48",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3172:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22089EF2-B027-4B88-A3F8-229A65D9DDEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3524:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E613A55C-F925-42A9-9A09-F03B0350B3B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_3548:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12F474C7-EB30-4069-A723-54269F5AFFE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589."
},
{
"lang": "es",
"value": "La implementaci\u00f3n DHCP en la caracter\u00edstica PowerOn Auto Provisioning (POAP) en Cisco NX-OS no restringe correctamente el proceso de inicializaci\u00f3n, lo que permite a atacantes remotos ejecutar comandos arbitrarios como root mediante el env\u00edo de paquetes de respuestas manipulados en la red local, tambi\u00e9n conocido como Bug ID CSCur14589."
}
],
"id": "CVE-2015-0658",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-03-28T01:59:49.210",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id/1031992"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031992"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…