ID

VAR-201601-0489


CVE

CVE-2015-6421


TITLE

Cisco Wide Area Application Service and Virtual WAAS Run on device CIFS Service disruption in optimization function (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-006859

DESCRIPTION

cifs-ao in the CIFS optimization functionality on Cisco Wide Area Application Service (WAAS) and Virtual WAAS (vWAAS) devices 5.x before 5.3.5d and 5.4 and 5.5 before 5.5.3 allows remote attackers to cause a denial of service (resource consumption and device reload) via crafted network traffic, aka Bug ID CSCus85330. Cisco Wide Area Application Services is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to reload the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCus85330. WAAS is a set of WAN link acceleration software. This software is mainly used in the link environment with small bandwidth and large delay. vWAAS is a cloud-based WAN optimization solution. The solution supports the use of policy-based on-demand business processes to accelerate private and virtual private cloud infrastructure and application delivery. There is a security vulnerability in cifs-ao in the CIFS optimization feature of Cisco WAAS and vWAAS. The following products and versions are affected: Cisco WAAS and vWAAS 5.3.5d prior to 5.x releases, 5.4 releases, 5.5.3 prior to 5.5 releases

Trust: 1.98

sources: NVD: CVE-2015-6421 // JVNDB: JVNDB-2015-006859 // BID: 82007 // VULHUB: VHN-84382

AFFECTED PRODUCTS

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5

Trust: 1.9

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.3

Trust: 1.9

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.1

Trust: 1.9

vendor:ciscomodel:wide area application servicesscope:eqversion:5.1.1a

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.2_base

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.1.1c

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.1.1

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5a

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.1.1b

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.2.1

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5b

Trust: 1.0

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5c

Trust: 1.0

vendor:ciscomodel:wide area application servicesscope:eqversion:5.1.1d

Trust: 1.0

vendor:ciscomodel:wide area application services softwarescope:eqversion:5.1

Trust: 0.8

vendor:ciscomodel:wide area application services softwarescope:eqversion:5.2

Trust: 0.8

vendor:ciscomodel:wide area application services softwarescope:eqversion:5.3

Trust: 0.8

vendor:ciscomodel:wide area application services softwarescope:eqversion:5.4

Trust: 0.8

vendor:ciscomodel:wide area application services softwarescope:eqversion:5.5

Trust: 0.8

vendor:ciscomodel:wide area application services modulesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:5.5

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:5.4

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3

Trust: 0.3

vendor:ciscomodel:wide area application services basescope:eqversion:5.2.1

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:wide area application services 5.1.1f-b1scope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application services 5.1.1fscope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application services 5.1.1e-b13scope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application services 5.1.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application services 5.1.1dscope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application services 5.3.5ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:neversion:5.5.3

Trust: 0.3

vendor:ciscomodel:wide area application services 5.3.5dscope:neversion: -

Trust: 0.3

sources: BID: 82007 // JVNDB: JVNDB-2015-006859 // CNNVD: CNNVD-201601-655 // NVD: CVE-2015-6421

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6421
value: HIGH

Trust: 1.0

NVD: CVE-2015-6421
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201601-655
value: HIGH

Trust: 0.6

VULHUB: VHN-84382
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6421
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-84382
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-6421
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-84382 // JVNDB: JVNDB-2015-006859 // CNNVD: CNNVD-201601-655 // NVD: CVE-2015-6421

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-84382 // JVNDB: JVNDB-2015-006859 // NVD: CVE-2015-6421

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-655

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201601-655

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006859

PATCH

title:cisco-sa-20160127-waascifsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-waascifs

Trust: 0.8

title:Cisco Wide Area Application Services and Virtual WAAS Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59966

Trust: 0.6

sources: JVNDB: JVNDB-2015-006859 // CNNVD: CNNVD-201601-655

EXTERNAL IDS

db:NVDid:CVE-2015-6421

Trust: 2.8

db:SECTRACKid:1034831

Trust: 1.1

db:JVNDBid:JVNDB-2015-006859

Trust: 0.8

db:CNNVDid:CNNVD-201601-655

Trust: 0.7

db:BIDid:82007

Trust: 0.4

db:VULHUBid:VHN-84382

Trust: 0.1

sources: VULHUB: VHN-84382 // BID: 82007 // JVNDB: JVNDB-2015-006859 // CNNVD: CNNVD-201601-655 // NVD: CVE-2015-6421

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160127-waascifs

Trust: 2.0

url:http://www.securitytracker.com/id/1034831

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6421

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6421

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/c/en/us/products/routers/wide-area-application-services/index.html

Trust: 0.3

sources: VULHUB: VHN-84382 // BID: 82007 // JVNDB: JVNDB-2015-006859 // CNNVD: CNNVD-201601-655 // NVD: CVE-2015-6421

CREDITS

Cisco

Trust: 0.3

sources: BID: 82007

SOURCES

db:VULHUBid:VHN-84382
db:BIDid:82007
db:JVNDBid:JVNDB-2015-006859
db:CNNVDid:CNNVD-201601-655
db:NVDid:CVE-2015-6421

LAST UPDATE DATE

2025-04-13T23:23:41.629000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-84382date:2016-12-07T00:00:00
db:BIDid:82007date:2016-01-27T00:00:00
db:JVNDBid:JVNDB-2015-006859date:2016-02-09T00:00:00
db:CNNVDid:CNNVD-201601-655date:2016-01-28T00:00:00
db:NVDid:CVE-2015-6421date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-84382date:2016-01-27T00:00:00
db:BIDid:82007date:2016-01-27T00:00:00
db:JVNDBid:JVNDB-2015-006859date:2016-02-09T00:00:00
db:CNNVDid:CNNVD-201601-655date:2016-01-28T00:00:00
db:NVDid:CVE-2015-6421date:2016-01-27T22:59:01.363