Vulnerability Description
The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial of service (tmp/*config file creation, memory consumption, and device hang) via unspecified vectors, aka Bug ID CSCut93842.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Nx-Os | 5.1.3 |
| Cisco | Nexus 93120Tx | - |
| Cisco | Nexus 93128Tx | - |
| Cisco | Nexus 9332Pq | - |
| Cisco | Nexus 9336Pq Aci Spine | - |
| Cisco | Nexus 9372Px | - |
| Cisco | Nexus 9372Tx | - |
| Cisco | Nexus 9396Px | - |
| Cisco | Nexus 9396Tx | - |
| Cisco | Nexus 9504 | - |
| Cisco | Nexus 9508 | - |
| Cisco | Nexus 9516 | - |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/viewAlert.x?alertId=39939Vendor Advisory
- http://www.securitytracker.com/id/1033259
- http://tools.cisco.com/security/center/viewAlert.x?alertId=39939Vendor Advisory
- http://www.securitytracker.com/id/1033259
FAQ
What is CVE-2015-4277?
CVE-2015-4277 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The global-configuration implementation on Cisco ASR 9000 devices with software 5.1.3 and 5.3.0 improperly closes vty sessions after a commit/end operation, which allows local users to cause a denial ...
How severe is CVE-2015-4277?
CVE-2015-4277 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4277?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Nx-Os, Cisco Nexus 93120Tx, Cisco Nexus 93128Tx, Cisco Nexus 9332Pq, Cisco Nexus 9336Pq Aci Spine.