var-201503-0162
Vulnerability from variot
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Successfully exploiting this issue may allow an attacker to execute arbitrary commands with the security context of the root user. This issue is being tracked by Cisco bug ID CSCur14589. Cisco NX-OS is a data center-oriented operating system developed by Cisco
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0162", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os for nexus series 5.0 u5", "scope": "eq", "trust": 2.7, "vendor": "cisco", "version": "3000" }, { "model": "nx-os for nexus series 6.0 n2", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "6000" }, { "model": "nx-os for nexus series 6.0 n2", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "5000" }, { "model": "nx-os for nexus series 6.0 u2", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "3000" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u4\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.1\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u2\\(5\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u3\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u4\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u2\\(6\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u3\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u3\\(5\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u3\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)u3\\(4\\)" }, { "model": "nx-os for nexus series 6.1 i2", "scope": "eq", "trust": 1.5, "vendor": "cisco", "version": "9000" }, { "model": "nx-os for nexus series 6.0 u3", "scope": "eq", "trust": 1.5, "vendor": "cisco", "version": "3000" }, { "model": "nx-os for nexus series 6.0 u1", "scope": "eq", "trust": 1.5, "vendor": "cisco", "version": "3000" }, { "model": "nx-os", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "nx-os for nexus series 6.2", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "7000" }, { "model": "nx-os for nexus series 7.0 n1", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "6000" }, { "model": "nx-os for nexus series 7.0 n1", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "5000" }, { "model": "nx-os for nexus series 5.0 u3", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "3000" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(4a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0\\(1c\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(5\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n1\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(3\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u4\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1e\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(0\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.0\\(1b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u2\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(6\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i2\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i3\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(4\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(2\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.0\\(1\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(8\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1d\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1g\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i3\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u1\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(4\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(1b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(6b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i2\\(2b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n1\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u1\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1h\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(2b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(8b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i2\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1f\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u1\\(4\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u2\\(4\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1c\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)u5\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u4\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.2\\(8a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1\\(2\\)i3\\(2\\)" }, { "model": "nx-os for nexus series 6.1 i3", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "9000" }, { "model": "nx-os for nexus series 6.0 u4", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "3000" }, { "model": "nx-os for nexus series 11.0", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9000" }, { "model": "nx-os for nexus series 6.0 n1", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6000" }, { "model": "nx-os for nexus series 6.0 n1", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.2(8)" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.2(6)" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.2(2)" }, { "model": "nx-os for nexus series 6.1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7000" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.1(4)" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.1(3)" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.1(2)" }, { "model": "nx-os for nexus series 6.0 u5", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "nx-os for nexus series 5.0 u4", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "BID", "id": "73390" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "CNNVD", "id": "CNNVD-201503-609" }, { "db": "NVD", "id": "CVE-2015-0658" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:nx-os", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001987" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "73390" } ], "trust": 0.3 }, "cve": "CVE-2015-0658", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 5.5, "id": "CVE-2015-0658", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.2, "id": "CNVD-2015-02076", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 5.5, "id": "VHN-78604", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-0658", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-0658", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-02076", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201503-609", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-78604", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "VULHUB", "id": "VHN-78604" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "CNNVD", "id": "CNNVD-201503-609" }, { "db": "NVD", "id": "CVE-2015-0658" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary commands with the security context of the root user. \nThis issue is being tracked by Cisco bug ID CSCur14589. Cisco NX-OS is a data center-oriented operating system developed by Cisco", "sources": [ { "db": "NVD", "id": "CVE-2015-0658" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "BID", "id": "73390" }, { "db": "VULHUB", "id": "VHN-78604" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0658", "trust": 3.4 }, { "db": "SECTRACK", "id": "1031992", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-001987", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201503-609", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-02076", "trust": 0.6 }, { "db": "BID", "id": "73390", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-78604", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "VULHUB", "id": "VHN-78604" }, { "db": "BID", "id": "73390" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "CNNVD", "id": "CNNVD-201503-609" }, { "db": "NVD", "id": "CVE-2015-0658" } ] }, "id": "VAR-201503-0162", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "VULHUB", "id": "VHN-78604" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" } ] }, "last_update_date": "2024-11-23T22:08:09.496000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "38062", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062" }, { "title": "Patch for Cisco NX-OS PowerOn Auto Provisioning (POAP) arbitrary command execution vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/56775" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78604" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "NVD", "id": "CVE-2015-0658" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38062" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031992" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0658" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0658" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "VULHUB", "id": "VHN-78604" }, { "db": "BID", "id": "73390" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "CNNVD", "id": "CNNVD-201503-609" }, { "db": "NVD", "id": "CVE-2015-0658" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-02076" }, { "db": "VULHUB", "id": "VHN-78604" }, { "db": "BID", "id": "73390" }, { "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "db": "CNNVD", "id": "CNNVD-201503-609" }, { "db": "NVD", "id": "CVE-2015-0658" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-31T00:00:00", "db": "CNVD", "id": "CNVD-2015-02076" }, { "date": "2015-03-28T00:00:00", "db": "VULHUB", "id": "VHN-78604" }, { "date": "2015-03-27T00:00:00", "db": "BID", "id": "73390" }, { "date": "2015-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "date": "2015-03-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-609" }, { "date": "2015-03-28T01:59:49.210000", "db": "NVD", "id": "CVE-2015-0658" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-31T00:00:00", "db": "CNVD", "id": "CNVD-2015-02076" }, { "date": "2015-10-22T00:00:00", "db": "VULHUB", "id": "VHN-78604" }, { "date": "2015-03-27T00:00:00", "db": "BID", "id": "73390" }, { "date": "2015-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001987" }, { "date": "2015-04-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-609" }, { "date": "2024-11-21T02:23:29.213000", "db": "NVD", "id": "CVE-2015-0658" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-609" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco NX-OS of PowerOn Auto Provisioning Functional DHCP In the implementation of root As an arbitrary command execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001987" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-609" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.