First published: Sat Jun 13 2015(Updated: )
The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(4\)m6 | |
Cisco IOS | =15.2m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4185 has a medium severity rating due to its potential to allow local users to gain elevated privileges.
To fix CVE-2015-4185, upgrade to a non-vulnerable version of Cisco IOS that addresses this specific vulnerability.
CVE-2015-4185 affects local users of Cisco IOS versions 15.2(4)m6 and 15.2m who can manipulate the vty state.
CVE-2015-4185 is not directly exploitable remotely as it requires local access to the system.
CVE-2015-4185 impacts devices running the vulnerable versions of Cisco IOS mentioned in the vulnerability report.