ID

VAR-201503-0182


CVE

CVE-2015-0649


TITLE

Cisco IOS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001955

DESCRIPTION

Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514. Cisco IOS There is a service disruption ( Device reload ) There are vulnerabilities that are put into a state. Cisco IOS is a popular Internet operating system. Successful exploits may allow an attacker to cause memory leak or reload of an affected device, resulting in denial-of-service conditions. These issues are being tracked by Cisco Bug IDs CSCum98371, CSCun49658 and CSCun63514. The following releases are affected: Cisco IOS Release 12.2, Release 12.4, Release 15.0, Release 15.2, Release 15.3

Trust: 2.52

sources: NVD: CVE-2015-0649 // JVNDB: JVNDB-2015-001955 // CNVD: CNVD-2015-02100 // BID: 73334 // VULHUB: VHN-78595

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-02100

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)ja1n

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jap1m

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se7

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se6

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)jab1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)jn

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)jnb

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ey3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ed1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.4

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.4

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 1.4

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.4

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.4

vendor:ciscomodel:ios 12.2 se1scope: - version: -

Trust: 1.2

vendor:ciscomodel:ios 12.2 sescope: - version: -

Trust: 1.2

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)ire3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se6

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jam1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(58\)se2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(1\)ey2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(44\)sq1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)ird1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(52\)se

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se9

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ey2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(52\)se1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se8

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3\(2\)s2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ey

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)jb1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)ex

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxi4b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)eb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se7

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jaz1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(1\)ey1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(1\)ey

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)ey

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)ey1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)se3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(55\)se5

Trust: 1.0

vendor:ciscomodel:ios 12.2 se2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.0 ey2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.0 ey1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.0 eyscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 se5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 se4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2 se3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jabscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jaascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jab1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jabscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jaascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja75scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1nscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja100scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 ja1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 ey1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0edscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0ebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ey3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ed1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 ebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jazscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4japscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4jamscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jaz1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jap1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 jam1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 se8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 se7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 se6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ex1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sxi4bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ire3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 ird1scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-02100 // BID: 73334 // JVNDB: JVNDB-2015-001955 // CNNVD: CNNVD-201503-578 // NVD: CVE-2015-0649

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0649
value: HIGH

Trust: 1.0

NVD: CVE-2015-0649
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-02100
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201503-578
value: HIGH

Trust: 0.6

VULHUB: VHN-78595
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0649
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-02100
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78595
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-02100 // VULHUB: VHN-78595 // JVNDB: JVNDB-2015-001955 // CNNVD: CNNVD-201503-578 // NVD: CVE-2015-0649

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78595 // JVNDB: JVNDB-2015-001955 // NVD: CVE-2015-0649

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-578

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201503-578

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001955

PATCH

title:cisco-sa-20150325-cipurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip

Trust: 0.8

title:37819url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37819

Trust: 0.8

title:Patch for Cisco IOS TCP Packet Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/56820

Trust: 0.6

sources: CNVD: CNVD-2015-02100 // JVNDB: JVNDB-2015-001955

EXTERNAL IDS

db:NVDid:CVE-2015-0649

Trust: 3.4

db:JVNDBid:JVNDB-2015-001955

Trust: 0.8

db:CNNVDid:CNNVD-201503-578

Trust: 0.7

db:CNVDid:CNVD-2015-02100

Trust: 0.6

db:BIDid:73334

Trust: 0.3

db:VULHUBid:VHN-78595

Trust: 0.1

sources: CNVD: CNVD-2015-02100 // VULHUB: VHN-78595 // BID: 73334 // JVNDB: JVNDB-2015-001955 // CNNVD: CNNVD-201503-578 // NVD: CVE-2015-0649

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150325-cip

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0649

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0649

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37819

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37818

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37817

Trust: 0.3

sources: CNVD: CNVD-2015-02100 // VULHUB: VHN-78595 // BID: 73334 // JVNDB: JVNDB-2015-001955 // CNNVD: CNNVD-201503-578 // NVD: CVE-2015-0649

CREDITS

The Cisco Product Security Incident Response Team (PSIRT)

Trust: 0.3

sources: BID: 73334

SOURCES

db:CNVDid:CNVD-2015-02100
db:VULHUBid:VHN-78595
db:BIDid:73334
db:JVNDBid:JVNDB-2015-001955
db:CNNVDid:CNNVD-201503-578
db:NVDid:CVE-2015-0649

LAST UPDATE DATE

2025-04-13T23:21:18.217000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-02100date:2015-03-31T00:00:00
db:VULHUBid:VHN-78595date:2015-03-27T00:00:00
db:BIDid:73334date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001955date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-578date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0649date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-02100date:2015-03-31T00:00:00
db:VULHUBid:VHN-78595date:2015-03-26T00:00:00
db:BIDid:73334date:2015-03-25T00:00:00
db:JVNDBid:JVNDB-2015-001955date:2015-03-30T00:00:00
db:CNNVDid:CNNVD-201503-578date:2015-03-27T00:00:00
db:NVDid:CVE-2015-0649date:2015-03-26T10:59:14.037