First published: Thu Mar 03 2016(Updated: )
Cisco NX-OS 7.1(1)N1(1) on Nexus 5500, 5600, and 6000 devices does not properly validate PDUs in SNMP packets, which allows remote attackers to cause a denial of service (SNMP application restart) via a crafted packet, aka Bug ID CSCut84645.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel GS1900-10HP firmware | <2.50\(aazi.0\)c0 | |
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6260 has a severity rating of medium, as it allows for denial of service through SNMP packet exploitation.
To mitigate the effects of CVE-2015-6260, upgrading to a Cisco NX-OS version that is not affected by this vulnerability is recommended.
CVE-2015-6260 affects Cisco NX-OS 7.1(1)N1(1) on Nexus 5500, 5600, and 6000 series devices.
The impact of CVE-2015-6260 is a denial of service that results in the SNMP application restarting.
There are no documented workarounds for CVE-2015-6260; updating to a fixed version is the primary method of protection.