Vulnerability Details : CVE-2015-6263
The RADIUS client implementation in Cisco IOS 15.4(3)M2.2, when a shared RADIUS secret is configured, allows remote RADIUS servers to cause a denial of service (device reload) via malformed answers, aka Bug ID CSCuu59324.
Vulnerability category: Denial of service
Products affected by CVE-2015-6263
- cpe:2.3:o:cisco:ios:15.4\(3\)m2.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6263
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6263
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | AV:N/AC:M/Au:S/C:N/I:N/A:C |
6.8
|
6.9
|
NIST |
CWE ids for CVE-2015-6263
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6263
-
http://www.securitytracker.com/id/1033747
Cisco IOS RADIUS Packet Processing Bug Lets Remote Authenticated Users Cause the Target System to Reload - SecurityTrackerThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151005-ios-radius
Cisco IOS Software RADIUS Client Denial of Service VulnerabilityVendor Advisory
Jump to