First published: Sat Feb 21 2015(Updated: )
Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IPS Sensor Software | =7.2\(1\)e4 | |
Cisco IPS Sensor Software | =7.2\(2\)e4 | |
Cisco Intrusion Detection System (IDS) Sensor Software | ||
Cisco Intrusion Detection System (IDS) Sensor Software | ||
Cisco Intrusion Detection System (IDS) Sensor Software | ||
Cisco IDS 4230 | ||
Cisco Intrusion Detection System (IDS) 4235 | ||
Cisco Intrusion Detection System (IDS) Sensor Software | ||
Cisco IDS 4250 | ||
Cisco IPS Sensor Software | ||
Cisco IPS Sensor Software | ||
Cisco IPS Sensor Software | ||
Cisco IPS Sensor Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0631 is classified as a denial of service vulnerability.
To mitigate CVE-2015-0631, upgrade to a patched version of the Cisco IPS or IDS software provided by Cisco.
CVE-2015-0631 affects Cisco IPS Sensor Software versions 7.2(1)e4 and 7.2(2)e4.
CVE-2015-0631 allows remote attackers to cause a denial of service by overwhelming the management interface.
CVE-2015-0631 was disclosed in early 2015.