First published: Wed Sep 02 2015(Updated: )
The ARP implementation in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 5.2(1)SV3(1.4), Nexus 3000 devices 7.3(0)ZD(0.47), Nexus 4000 devices 4.1(2)E1, Nexus 9000 devices 7.3(0)ZD(0.61), and MDS 9000 devices 7.0(0)HSK(0.353) and SAN-OS NX-OS on MDS 9000 devices 7.0(0)HSK(0.353) allows remote attackers to cause a denial of service (ARP process restart) via crafted packet-header fields, aka Bug ID CSCut25292.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.3\(0\)zd\(0.47\) | |
Cisco Nexus 3000 In Standalone Nx-os Mode | ||
Cisco NX-OS | =4.1\(2\)e1 | |
Cisco Nexus 4000 | ||
Cisco NX-OS | =7.0\(0\)hsk\(0.353\) | |
Cisco SAN-OS | =7.0\(0\)hsk\(0.353\) | |
Cisco MDS 9000 Series Multilayer Switches | ||
Cisco NX-OS | =7.3\(0\)zd\(0.61\) | |
Cisco Nexus 9000 Series | ||
Cisco Nexus 1000V for VMware vSphere | =5.2\(1\)sv3\(1.4\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6277 has a CVSS score of 7.8, indicating high severity.
CVE-2015-6277 affects Cisco NX-OS on Nexus 1000V, Nexus 3000, Nexus 4000, Nexus 9000, and MDS 9000 devices.
To fix CVE-2015-6277, upgrade the affected Cisco NX-OS devices to a version that is not vulnerable as recommended by Cisco advisories.
Yes, CVE-2015-6277 allows for remote code execution under specific conditions.
CVE-2015-6277 can potentially allow an attacker to manipulate ARP traffic, leading to unauthorized access or disruption of network services.