ID

VAR-201505-0177


CVE

CVE-2015-0731


TITLE

Cisco IOS of ISDN Service disruption in implementations (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-002717

DESCRIPTION

The ISDN implementation in Cisco IOS 15.3S allows remote attackers to cause a denial of service (device reload) via malformed Q931 SETUP messages, aka Bug ID CSCut37890. Cisco IOS is a popular Internet operating system. This issue is being tracked by Cisco Bug ID CSCut37890. ISDN (Integrated Services Digital Network, Integrated Services Digital Network) is one of the implementations of circuit switching network systems

Trust: 2.52

sources: NVD: CVE-2015-0731 // JVNDB: JVNDB-2015-002717 // CNVD: CNVD-2015-03273 // BID: 74662 // VULHUB: VHN-78677

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03273

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.3s

Trust: 2.4

vendor:ciscomodel:iosscope:eqversion:15.3\(3\)s1

Trust: 1.6

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.3 s1scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2015-03273 // JVNDB: JVNDB-2015-002717 // CNNVD: CNNVD-201505-255 // NVD: CVE-2015-0731

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0731
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0731
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-03273
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201505-255
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78677
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0731
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-03273
severity: MEDIUM
baseScore: 5.5
vectorString: AV:A/AC:L/AU:S/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 5.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78677
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-03273 // VULHUB: VHN-78677 // JVNDB: JVNDB-2015-002717 // CNNVD: CNNVD-201505-255 // NVD: CVE-2015-0731

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78677 // JVNDB: JVNDB-2015-002717 // NVD: CVE-2015-0731

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201505-255

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201505-255

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002717

PATCH

title:38833url:http://tools.cisco.com/security/center/viewAlert.x?alertId=38833

Trust: 0.8

title:Cisco IOS ISDN implements a patch for denial of service vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/58782

Trust: 0.6

sources: CNVD: CNVD-2015-03273 // JVNDB: JVNDB-2015-002717

EXTERNAL IDS

db:NVDid:CVE-2015-0731

Trust: 3.4

db:SECTRACKid:1032337

Trust: 1.1

db:BIDid:74662

Trust: 1.0

db:JVNDBid:JVNDB-2015-002717

Trust: 0.8

db:CNNVDid:CNNVD-201505-255

Trust: 0.7

db:CNVDid:CNVD-2015-03273

Trust: 0.6

db:VULHUBid:VHN-78677

Trust: 0.1

sources: CNVD: CNVD-2015-03273 // VULHUB: VHN-78677 // BID: 74662 // JVNDB: JVNDB-2015-002717 // CNNVD: CNNVD-201505-255 // NVD: CVE-2015-0731

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38833

Trust: 2.6

url:http://www.securitytracker.com/id/1032337

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0731

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0731

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-03273 // VULHUB: VHN-78677 // BID: 74662 // JVNDB: JVNDB-2015-002717 // CNNVD: CNNVD-201505-255 // NVD: CVE-2015-0731

CREDITS

Cisco

Trust: 0.3

sources: BID: 74662

SOURCES

db:CNVDid:CNVD-2015-03273
db:VULHUBid:VHN-78677
db:BIDid:74662
db:JVNDBid:JVNDB-2015-002717
db:CNNVDid:CNNVD-201505-255
db:NVDid:CVE-2015-0731

LAST UPDATE DATE

2025-04-13T23:14:33.082000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03273date:2015-05-22T00:00:00
db:VULHUBid:VHN-78677date:2017-01-06T00:00:00
db:BIDid:74662date:2015-05-14T00:00:00
db:JVNDBid:JVNDB-2015-002717date:2015-05-19T00:00:00
db:CNNVDid:CNNVD-201505-255date:2015-05-22T00:00:00
db:NVDid:CVE-2015-0731date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03273date:2015-05-22T00:00:00
db:VULHUBid:VHN-78677date:2015-05-16T00:00:00
db:BIDid:74662date:2015-05-14T00:00:00
db:JVNDBid:JVNDB-2015-002717date:2015-05-19T00:00:00
db:CNNVDid:CNNVD-201505-255date:2015-05-18T00:00:00
db:NVDid:CVE-2015-0731date:2015-05-16T02:01:44.637