2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-6324" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2015-10-25T02:59:05.133" ,
2023-08-15 16:00:43 +00:00
"lastModified" : "2023-08-15T14:52:02.310" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Analyzed" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The DHCPv6 relay implementation in Cisco Adaptive Security Appliance (ASA) software 9.0 before 9.0(4.37), 9.1 before 9.1(6.6), 9.2 before 9.2(4), 9.3 before 9.3(3.5), and 9.4 before 9.4(2) allows remote attackers to cause a denial of service (device reload) via crafted DHCPv6 packets, aka Bug IDs CSCus56252 and CSCus57142."
} ,
{
"lang" : "es" ,
"value" : "La implementaci\u00f3n DHCPv6 relay en Cisco Adaptive Security Appliance (ASA) software 9.0 en versiones anteriores a 9.0(4.37), 9.1 en versiones anteriores a 9.1(6.6), 9.2 en versiones anteriores a 9.2(4), 9.3 en versiones anteriores a 9.3(3.5) y 9.4 en versiones anteriores a 9.4(2) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes DHCPv6 manipulados, tambi\u00e9n conocida como Bug IDs CSCus56252 y CSCus57142."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:N/A:C" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.1
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6E1C03C-0737-4E2B-B3F9-10770281F4AA"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C7052D2-0789-4A4D-917D-FCD894B7280F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0956F0A8-7424-437C-AAD8-203183BEBFCC"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49FB57F9-5B37-4509-B2EB-6A16DFE11F03"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "952F6504-9CD0-453E-8C25-02BB9EE818F6"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E842AF74-D1E3-4F71-80F9-197B38942405"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F6293A8-C21E-46F6-ACC1-6BBAD419B41F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC1A48B1-112A-41C2-BC01-BCCF5794553D"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6448B4B4-022D-4D4A-A6DE-0090CEA12595"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42813600-3186-4D19-8AF2-F4F98D3C6740"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC0969E6-151D-4298-8EC8-68D7880E994B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-15 16:00:43 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A0091CE-3386-4CCC-A2A8-900842EA6F51"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4714F698-BBAE-47BB-99E8-F90D22415EDD"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB55BC7E-0B3F-4202-8768-08F27B763926"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFB01683-C482-4A5B-90FA-B5266BEA452E"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA16481A-4A47-4A8E-8C78-87B3A171280A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C0258ED-6ED0-49C7-A13A-368711649FFF"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D448BB56-5B2E-4B3E-B7E8-1F4991F23D81"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2049D602-54F1-4072-936E-0D7E337162B8"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0710D6C8-AD34-43E2-B72B-315FFF3DC34F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "70F8F1D2-2196-44C4-B420-824F49BB4ACF"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E14B8D3-6D53-4E84-9B5D-24667B192C4B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A05B2DFD-A0EF-42BE-B00B-334E78CA8C10"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CC96C9-492F-49CB-BEFE-356581E96B3C"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D5E93DE-06C0-401C-8062-1B2EB6EFDED6"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9C31567-8AEB-49C6-AA60-4150411D62AA"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA140CB2-C17C-4164-A59A-8585906057BA"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "468D98A7-92D5-4C01-9EDD-CB44B85EA6BB"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "39330218-32FA-42FF-B5CA-288B7D140304"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A92D7CED-D036-414B-B9EB-DCAF7F425A7D"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4AAAB02-140D-46F2-A315-5791BF5A853F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26D99395-D18D-458E-9880-19B7767F69D0"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F7DD812-DC72-4816-8B0F-361C32B2CD2F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC41D4CD-D5EA-4678-B3AA-962C7C937118"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B313B0E-4200-427F-A156-1EDA681F439D"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8C49821-3BA5-4B44-84F5-113024FD030F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2011F264-53A5-4507-843B-46F66D285ADB"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2023-08-11 20:00:41 +00:00
"criteria" : "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1033912" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
}
]
}