First published: Fri Jun 12 2015(Updated: )
The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =4.1\(2\)e1\(1f\) | |
Cisco Nexus 4001i | ||
Cisco NX-OS | =7.2\(0\)zn\(99.67\) | |
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172 Firmware | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco NX-OS | =6.0\(2\)n2\(2\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 series | ||
Cisco NX-OS | =6.2\(12\) | |
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus N9336PQ-X | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco Nexus 1000V for Hyper-V | ||
Cisco MDS 9000 NX-OS | =6.2\(11\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0775 is considered to have a medium severity level affecting certain Cisco NX-OS versions.
To fix CVE-2015-0775, you should upgrade to a patched version of Cisco NX-OS as recommended by Cisco.
CVE-2015-0775 affects several Cisco Nexus devices running vulnerable versions of NX-OS.
The CVE-2015-0775 vulnerability could allow an attacker to execute arbitrary code on the affected Cisco devices.
No official workarounds are provided for CVE-2015-0775, thus upgrading to a secure version is essential.