CVE-2015-0658
28.03.2015, 01:59
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | nx-os | 6.1\(2\) |
cisco | nx-os | 6.1\(3\) |
cisco | nx-os | 6.1\(4\) |
cisco | nx-os | 6.1\(4a\) |
cisco | nx-os | 6.2\(2\) |
cisco | nx-os | 6.2\(2a\) |
cisco | nx-os | 6.2\(6\) |
cisco | nx-os | 6.2\(6b\) |
cisco | nx-os | 6.2\(8\) |
cisco | nx-os | 6.2\(8a\) |
cisco | nx-os | 6.2\(8b\) |
cisco | nx-os | 6.0\(2\)n1\(1\) |
cisco | nx-os | 6.0\(2\)n1\(2\) |
cisco | nx-os | 6.0\(2\)n1\(2a\) |
cisco | nx-os | 6.0\(2\)n2\(1\) |
cisco | nx-os | 6.0\(2\)n2\(1b\) |
cisco | nx-os | 6.0\(2\)n2\(2\) |
cisco | nx-os | 6.0\(2\)n2\(3\) |
cisco | nx-os | 6.0\(2\)n2\(4\) |
cisco | nx-os | 6.0\(2\)n2\(5\) |
cisco | nx-os | 7.0\(0\)n1\(1\) |
cisco | nx-os | 7.0\(1\)n1\(1\) |
cisco | nx-os | 7.0\(2\)n1\(1\) |
cisco | nx-os | 7.0\(3\)n1\(1\) |
cisco | nx-os | 6.0\(2\)n1\(2\) |
cisco | nx-os | 6.0\(2\)n1\(2a\) |
cisco | nx-os | 6.0\(2\)n2\(1\) |
cisco | nx-os | 6.0\(2\)n2\(1b\) |
cisco | nx-os | 6.0\(2\)n2\(2\) |
cisco | nx-os | 6.0\(2\)n2\(3\) |
cisco | nx-os | 6.0\(2\)n2\(4\) |
cisco | nx-os | 6.0\(2\)n2\(5\) |
cisco | nx-os | 7.0\(0\)n1\(1\) |
cisco | nx-os | 7.0\(1\)n1\(1\) |
cisco | nx-os | 7.0\(2\)n1\(1\) |
cisco | nx-os | 7.0\(3\)n1\(1\) |
cisco | nx-os | 6.1\(2\)i2\(1\) |
cisco | nx-os | 6.1\(2\)i2\(2\) |
cisco | nx-os | 6.1\(2\)i2\(2a\) |
cisco | nx-os | 6.1\(2\)i2\(2b\) |
cisco | nx-os | 6.1\(2\)i2\(3\) |
cisco | nx-os | 6.1\(2\)i3\(1\) |
cisco | nx-os | 6.1\(2\)i3\(2\) |
cisco | nx-os | 6.1\(2\)i3\(3\) |
cisco | nx-os | 11.0\(1b\) |
cisco | nx-os | 11.0\(1c\) |
cisco | nx-os | 5.0\(3\)u3\(1\) |
cisco | nx-os | 5.0\(3\)u3\(2\) |
cisco | nx-os | 5.0\(3\)u3\(2a\) |
cisco | nx-os | 5.0\(3\)u3\(2b\) |
cisco | nx-os | 5.0\(3\)u4\(1\) |
cisco | nx-os | 5.0\(3\)u5\(1\) |
cisco | nx-os | 5.0\(3\)u5\(1a\) |
cisco | nx-os | 5.0\(3\)u5\(1b\) |
cisco | nx-os | 5.0\(3\)u5\(1c\) |
cisco | nx-os | 5.0\(3\)u5\(1d\) |
cisco | nx-os | 5.0\(3\)u5\(1e\) |
cisco | nx-os | 5.0\(3\)u5\(1f\) |
cisco | nx-os | 5.0\(3\)u5\(1g\) |
cisco | nx-os | 5.0\(3\)u5\(1h\) |
cisco | nx-os | 6.0\(2\)u1\(1\) |
cisco | nx-os | 6.0\(2\)u1\(1a\) |
cisco | nx-os | 6.0\(2\)u1\(2\) |
cisco | nx-os | 6.0\(2\)u1\(3\) |
cisco | nx-os | 6.0\(2\)u1\(4\) |
cisco | nx-os | 6.0\(2\)u2\(1\) |
cisco | nx-os | 6.0\(2\)u2\(2\) |
cisco | nx-os | 6.0\(2\)u2\(3\) |
cisco | nx-os | 6.0\(2\)u2\(4\) |
cisco | nx-os | 6.0\(2\)u2\(5\) |
cisco | nx-os | 6.0\(2\)u2\(6\) |
cisco | nx-os | 6.0\(2\)u3\(1\) |
cisco | nx-os | 6.0\(2\)u3\(2\) |
cisco | nx-os | 6.0\(2\)u3\(3\) |
cisco | nx-os | 6.0\(2\)u3\(4\) |
cisco | nx-os | 6.0\(2\)u3\(5\) |
cisco | nx-os | 6.0\(2\)u4\(1\) |
cisco | nx-os | 6.0\(2\)u4\(2\) |
cisco | nx-os | 6.0\(2\)u4\(3\) |
cisco | nx-os | 6.0\(2\)u5\(1\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration