MEDIUM · 4.9

CVE-2015-4277

The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial ...

Vulnerability Description

The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial of service (tmp/*config file creation, memory consumption, and device hang) via unspecified vectors, aka Bug ID CSCut93842.

CVSS Score

4.9

MEDIUM

AV:L/AC:L/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
CiscoNx-Os5.1.3
CiscoNexus 93120Tx-
CiscoNexus 93128Tx-
CiscoNexus 9332Pq-
CiscoNexus 9336Pq Aci Spine-
CiscoNexus 9372Px-
CiscoNexus 9372Tx-
CiscoNexus 9396Px-
CiscoNexus 9396Tx-
CiscoNexus 9504-
CiscoNexus 9508-
CiscoNexus 9516-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-4277?

CVE-2015-4277 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial ...

How severe is CVE-2015-4277?

CVE-2015-4277 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-4277?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Nx-Os, Cisco Nexus 93120Tx, Cisco Nexus 93128Tx, Cisco Nexus 9332Pq, Cisco Nexus 9336Pq Aci Spine.