Vulnerability Description
The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | <= 15.4\(2\)t3 |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=37416Vendor Advisory
- http://www.securitytracker.com/id/1031713
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100758
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=37416Vendor Advisory
- http://www.securitytracker.com/id/1031713
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100758
FAQ
What is CVE-2015-0592?
CVE-2015-0592 is a vulnerability with a CVSS score of 7.8 (HIGH). The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kerne...
How severe is CVE-2015-0592?
CVE-2015-0592 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0592?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios.