Denial of service in Cisco Systems, Inc products - CVE-2015-6392

 

Denial of service in Cisco Systems, Inc products - CVE-2015-6392

Published: October 5, 2016 / Updated: April 5, 2018


Vulnerability identifier: #VU791
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-6392
CWE-ID: CWE-399
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Nexus 9000 Series Switches in ACI Mode
Cisco Nexus 9000 Series Switches NX-OS Mode
Cisco Nexus 7700 Series Switches
Cisco Nexus 7000 Series Switches
Cisco Nexus 5000 Series Switches
Cisco Nexus 2000 Series Switches
Cisco Nexus 5500 Series Switches
Cisco Nexus 5600 Series Switches
Cisco Nexus 6000 Series Switches

Detailed vulnerability description

The vulnerability allows a remote unathenticated user to cause DoS conditions on the target system.
The weakness is caused by improper validation of the DHCPv4 packets. By sending a specially crafted DHCPv4 packets attackers can cause the DHCP process or device to crash.
Succesfull exploitation of the vulnerability results in denial of service on the vulnerable system.

How to mitigate CVE-2015-6392

Update Cisco Nexus 5000 Series Switches to 5.2(1)N1(9a).
Update Cisco Nexus 2000, 5500, 5600, and 6000 Series Switches to 7.1(4)N1(1), 7.2(2)N1(1) or 7.3(0)N1(1).
Update Cisco Nexus 7000 and 7700 Series Switches to 7.2(2)D1(1) or 7.3(1)D1(1).
Update Cisco Nexus 9000 Series Switches in ACI Mode to 11.1(1j).
Update Cisco Nexus 9000 Series Switches in NX-OS Mode to 7.0(3)I4(1).

Sources