First published: Thu Feb 12 2015(Updated: )
Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | <=15.5\(2\)t | |
Cisco IOS | =15.5\(1\)t | |
Cisco IOS | =15.5\(1\)t1 | |
Cisco IOS | =15.5t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0610 has been rated as a high severity vulnerability due to the potential for remote access restrictions to be bypassed.
To fix CVE-2015-0610, upgrade to a later version of Cisco IOS that is not affected, specifically versions after 15.5(2)T.
The impact of CVE-2015-0610 is that an attacker can bypass access control lists, leading to unauthorized access to network resources.
CVE-2015-0610 affects Cisco IOS versions 15.5(2)T and earlier, including 15.5(1)T, 15.5(1)T1, and 15.5T.
As of the latest reports, there have been no confirmed instances of CVE-2015-0610 being actively exploited in the wild.