mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
181 lines
6.2 KiB
JSON
181 lines
6.2 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2015-6429",
|
||
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||
|
"published": "2015-12-19T14:59:00.123",
|
||
|
"lastModified": "2016-12-07T18:20:22.180",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "The IKEv1 state machine in Cisco IOS 15.4 through 15.6 and IOS XE 3.15 through 3.17 allows remote attackers to cause a denial of service (IPsec connection termination) via a crafted IKEv1 packet to a tunnel endpoint, aka Bug ID CSCuw08236."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "La m\u00e1quina de estado IKEv1 en Cisco IOS 15.4 hasta la versi\u00f3n 15.6 y IOS XE 3.15 hasta la versi\u00f3n 3.17 permite a atacantes remotos causar una denegaci\u00f3n de servicio (terminaci\u00f3n de conexi\u00f3n IPsec) a trav\u00e9s de un paquete IKEv1 manipulado en un dispositivo final del tunel, tambi\u00e9n conocida como Bug ID CSCuw08236."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 5.0
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-19"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "716EC9AA-0569-4FA7-A244-1A14FA15C5AD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(0.17\\)t:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "96BDDBD0-684C-4E90-ACF9-F45D4B85835F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5D9E5471-04AF-47A5-ACC7-335516356BDD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FB8A0099-DE49-4AB6-A408-EE5D62642D17"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.15s.2:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CE69B061-8523-487E-B749-28D56458A621"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16s.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "25257039-7860-4424-8C92-267FC444DA33"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16s.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A0D78F52-7B40-4A9B-AC8E-150AFCAA7AF1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17s.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "203E013A-85E3-4D5B-A863-86297134BA04"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:cisco:ios_xe:3.17s.1:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1BB0A028-FA64-4899-AEC7-D6C5040E7C0E"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151218-ios",
|
||
|
"source": "ykramarz@cisco.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securitytracker.com/id/1034505",
|
||
|
"source": "ykramarz@cisco.com"
|
||
|
}
|
||
|
]
|
||
|
}
|