Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-0721 |
CWE-ID | CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Cisco MDS 9000 Series Multilayer Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 9000 Series Switches NX-OS Mode Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 6000 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 5600 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 5000 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 2000 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 4000 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Nexus 3500 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 3000 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 1000 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Nexus 7700 Series Switches Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU780
Risk: Low
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2015-0721
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to bypass authentication, authorization, and accounting (AAA) limitations.
The weakness exists due to incorrect handling of parameters passed during negotiation of an SSH connection. Attackers will manage to pass a malicious value as a part of login procedure that allows to bypass AAA restrictions and execute arbitrary commands.
Successful exploitation of the vulnerability results in AAA bypass and access to the vulnerable system.
Update Cisco Nexus 1000 to 5.2(1)SV3(1.15).
Update Cisco Nexus 3000 to 6.0(2)U6(7) or 7.0(3)I4(1).
Update Cisco Nexus 3500 to 6.0(2)A8(1).
Update Cisco Nexus 4000 to 4.1(2)E1(1p).
Update Cisco Nexus 5000 to 5.2(1)N1(9a).
Cisco MDS 9000 Series Multilayer Switches: 5.2 - 7.3
Cisco Nexus 9000 Series Switches NX-OS Mode: 6.1 - 7.0
Cisco Nexus 6000 Series Switches: 5.2 - 7.3
Cisco Nexus 5600 Series Switches: 5.2 - 7.3
Cisco Nexus 5000 Series Switches: 5.1 - 7.3
Cisco Nexus 2000 Series Switches: 5.2 - 7.3
Cisco Nexus 4000 Series Switches: 4.1
Nexus 3500 Series Switches: 5.0 - 6.0
Cisco Nexus 3000 Series Switches: 6.0 - 7.0
Cisco Nexus 1000 Series Switches: 4.2 - 5.2
Cisco Nexus 7700 Series Switches: 5.0 - 7.3
CPE2.3https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-nxaaa
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.