ID

VAR-201506-0246


CVE

CVE-2015-4185


TITLE

Cisco IOS of TCL Vulnerability in the interpreter that gains privileges

Trust: 0.8

sources: JVNDB: JVNDB-2015-003079

DESCRIPTION

The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202. Cisco IOS is an operating system developed by Cisco Systems for its network devices. This issue is being tracked by Cisco Bug ID CSCuq24202

Trust: 2.61

sources: NVD: CVE-2015-4185 // JVNDB: JVNDB-2015-003079 // CNVD: CNVD-2015-03868 // BID: 72310 // VULHUB: VHN-82146 // VULMON: CVE-2015-4185

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-03868

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)m6

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.2m

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 0.8

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.2 m6scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios software 15.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios software 15.2 m6scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-03868 // BID: 72310 // JVNDB: JVNDB-2015-003079 // CNNVD: CNNVD-201506-250 // NVD: CVE-2015-4185

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4185
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-4185
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-03868
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201506-250
value: MEDIUM

Trust: 0.6

VULHUB: VHN-82146
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-4185
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4185
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-03868
severity: MEDIUM
baseScore: 6.6
vectorString: AV:L/AC:M/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 2.7
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-82146
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-03868 // VULHUB: VHN-82146 // VULMON: CVE-2015-4185 // JVNDB: JVNDB-2015-003079 // CNNVD: CNNVD-201506-250 // NVD: CVE-2015-4185

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-82146 // JVNDB: JVNDB-2015-003079 // NVD: CVE-2015-4185

THREAT TYPE

local

Trust: 0.9

sources: BID: 72310 // CNNVD: CNNVD-201506-250

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201506-250

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003079

PATCH

title:39343url:http://tools.cisco.com/security/center/viewAlert.x?alertId=39343

Trust: 0.8

title:Patch for Cisco IOS TCL Interpreter Privilege Escalation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/59747

Trust: 0.6

title:Cisco: Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=Cisco-SA-20150612-CVE-2015-4185

Trust: 0.1

sources: CNVD: CNVD-2015-03868 // VULMON: CVE-2015-4185 // JVNDB: JVNDB-2015-003079

EXTERNAL IDS

db:NVDid:CVE-2015-4185

Trust: 3.5

db:BIDid:72310

Trust: 2.1

db:SECTRACKid:1032581

Trust: 1.2

db:JVNDBid:JVNDB-2015-003079

Trust: 0.8

db:CNNVDid:CNNVD-201506-250

Trust: 0.7

db:CNVDid:CNVD-2015-03868

Trust: 0.6

db:VULHUBid:VHN-82146

Trust: 0.1

db:VULMONid:CVE-2015-4185

Trust: 0.1

sources: CNVD: CNVD-2015-03868 // VULHUB: VHN-82146 // VULMON: CVE-2015-4185 // BID: 72310 // JVNDB: JVNDB-2015-003079 // CNNVD: CNNVD-201506-250 // NVD: CVE-2015-4185

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39343

Trust: 2.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4185

Trust: 1.4

url:http://www.securityfocus.com/bid/72310

Trust: 1.3

url:http://www.securitytracker.com/id/1032581

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4185

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-cve-2015-4185

Trust: 0.1

sources: CNVD: CNVD-2015-03868 // VULHUB: VHN-82146 // VULMON: CVE-2015-4185 // BID: 72310 // JVNDB: JVNDB-2015-003079 // CNNVD: CNNVD-201506-250 // NVD: CVE-2015-4185

CREDITS

Cisco

Trust: 0.3

sources: BID: 72310

SOURCES

db:CNVDid:CNVD-2015-03868
db:VULHUBid:VHN-82146
db:VULMONid:CVE-2015-4185
db:BIDid:72310
db:JVNDBid:JVNDB-2015-003079
db:CNNVDid:CNNVD-201506-250
db:NVDid:CVE-2015-4185

LAST UPDATE DATE

2025-04-13T23:18:09.150000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-03868date:2015-06-19T00:00:00
db:VULHUBid:VHN-82146date:2017-01-04T00:00:00
db:VULMONid:CVE-2015-4185date:2017-01-04T00:00:00
db:BIDid:72310date:2015-06-12T00:00:00
db:JVNDBid:JVNDB-2015-003079date:2015-06-16T00:00:00
db:CNNVDid:CNNVD-201506-250date:2015-06-18T00:00:00
db:NVDid:CVE-2015-4185date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-03868date:2015-06-19T00:00:00
db:VULHUBid:VHN-82146date:2015-06-13T00:00:00
db:VULMONid:CVE-2015-4185date:2015-06-13T00:00:00
db:BIDid:72310date:2015-06-12T00:00:00
db:JVNDBid:JVNDB-2015-003079date:2015-06-16T00:00:00
db:CNNVDid:CNNVD-201506-250date:2015-06-15T00:00:00
db:NVDid:CVE-2015-4185date:2015-06-13T10:59:01.097