DNA View

CVE-2015-0718

Low
Low Medium High Critical
CVSS Score
Published: Mar 03, 2016
Last Modified: Apr 12, 2025

Vulnerability Description

Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.

Known Affected Software

63 configuration(s) from 4 vendor(s)

unified_computing_system
Version:
1.4_4j
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_4j:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_2d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_2d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_1a
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_1a:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_2r
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_2r:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3m
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3m:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_4i
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_4i:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3u
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3u:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_3d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_3d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_3b
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_3b:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_4l
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_4l:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_1i
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_1i:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_1s
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_1s:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_5b
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_5b:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_2a
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_2a:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_4a
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_4a:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_5a
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_5a:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_1j
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_1j:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_5f
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_5f:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_3e
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_3e:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_1e
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_1e:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_3f
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_3f:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_1b
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_1b:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3y
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3y:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_5e
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_5e:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_1f
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_1f:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_2q
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_2q:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3l
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3l:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3q
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3q:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_1e
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_1e:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_2d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_2d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_4b
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_4b:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_1d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_1d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_3b
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_3b:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_5c
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_5c:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_4f
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_4f:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_3c
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_3c:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_4d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_4d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_2c
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_2c:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_1t
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_1t:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_2c
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_2c:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_1m
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_1m:*:*:*:*:*:*:*
unified_computing_system
Version:
1.5_base
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.5_base:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_1d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_1d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_1b
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_1b:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_3a
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_3a:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3s
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3s:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_2m
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_2m:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_1c
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_1c:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_3i
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_3i:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_5d
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_5d:*:*:*:*:*:*:*
unified_computing_system
Version:
2.1_3c
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.1_3c:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_4k
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_4k:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_1q
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_1q:*:*:*:*:*:*:*
unified_computing_system
Version:
1.4_4g
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.4_4g:*:*:*:*:*:*:*
unified_computing_system
Version:
1.6_base
CPE:
cpe:2.3:a:cisco:unified_computing_system:1.6_base:*:*:*:*:*:*:*
nx-os
Version:
base
CPE:
cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_1w
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_1w:*:*:*:*:*:*:*
unified_computing_system
Version:
2.2_2e
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.2_2e:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_3a
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_3a:*:*:*:*:*:*:*
unified_computing_system
Version:
2.0_1x
CPE:
cpe:2.3:a:cisco:unified_computing_system:2.0_1x:*:*:*:*:*:*:*
x14j_firmware
Version:
t-ms14jakucb-1102.5
CPE:
cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
opensolaris
Version:
snv_124
CPE:
cpe:2.3:o:sun:opensolaris:snv_124:*:*:*:*:*:*:*
keymouse_firmware
Version:
3.08
CPE:
cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*
This vulnerability affects 63 software configuration(s). Ensure you patch all affected systems.

Severity Details

out of 10.0
Low

Weakness Type (CWE)

CWE-399

Key Information

Published Date
March 03, 2016