Vulnerability Description
The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | 15.2\(4\)m6 |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/viewAlert.x?alertId=39343Vendor Advisory
- http://www.securityfocus.com/bid/72310Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1032581Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/viewAlert.x?alertId=39343Vendor Advisory
- http://www.securityfocus.com/bid/72310Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1032581Third Party AdvisoryVDB Entry
FAQ
What is CVE-2015-4185?
CVE-2015-4185 is a vulnerability with a CVSS score of 6.9 (MEDIUM). The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSC...
How severe is CVE-2015-4185?
CVE-2015-4185 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4185?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios.