First published: Thu Feb 12 2015(Updated: )
The Zone-Based Firewall implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers incorrect kernel-timer handling, aka Bug ID CSCuh25672.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | <=15.4\(2\)t3 | |
Cisco IOS | =15.4\(1\)t | |
Cisco IOS | =15.4\(1\)t1 | |
Cisco IOS | =15.4\(1\)t2 | |
Cisco IOS | =15.4\(1\)t3 | |
Cisco IOS | =15.4\(1\)t4 | |
Cisco IOS | =15.4\(2\)t | |
Cisco IOS | =15.4\(2\)t1 | |
Cisco IOS | =15.4\(2\)t2 | |
Cisco IOS | =15.4t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0592 is classified as a high severity vulnerability due to its potential to cause a denial of service by triggering device reload.
To fix CVE-2015-0592, update your Cisco IOS to a version later than 15.4(2)T3.
CVE-2015-0592 affects Cisco IOS devices running versions 15.4(2)T3 and earlier.
Attackers can exploit CVE-2015-0592 to send crafted network traffic that leads to the device reloading, causing a denial of service.
There is no official workaround for CVE-2015-0592; the recommended action is to upgrade to a fixed version.