Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2015-0640

The high-speed logging (HSL) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.1S, 3.13 before 3.13.0S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via large IP packets that require NAT and HSL processing after fragmentation, aka Bug ID CSCuo25741.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 77.1%
CVSS Severity
CVSS v2 Score 7.8
Products affected by CVE-2015-0640
  • Cisco » Ios Xe » Version: 3.10s.0
    cpe:2.3:o:cisco:ios_xe:3.10s.0
  • Cisco » Ios Xe » Version: 3.10s.0a
    cpe:2.3:o:cisco:ios_xe:3.10s.0a
  • Cisco » Ios Xe » Version: 3.10s.1
    cpe:2.3:o:cisco:ios_xe:3.10s.1
  • Cisco » Ios Xe » Version: 3.10s.2
    cpe:2.3:o:cisco:ios_xe:3.10s.2
  • Cisco » Ios Xe » Version: 3.10s.3
    cpe:2.3:o:cisco:ios_xe:3.10s.3
  • Cisco » Ios Xe » Version: 3.11s.0
    cpe:2.3:o:cisco:ios_xe:3.11s.0
  • Cisco » Ios Xe » Version: 3.11s.1
    cpe:2.3:o:cisco:ios_xe:3.11s.1
  • Cisco » Ios Xe » Version: 3.11s.2
    cpe:2.3:o:cisco:ios_xe:3.11s.2
  • Cisco » Ios Xe » Version: 3.12s.0
    cpe:2.3:o:cisco:ios_xe:3.12s.0
  • Cisco » Ios Xe » Version: 3.12s.1
    cpe:2.3:o:cisco:ios_xe:3.12s.1
  • Cisco » Ios Xe » Version: 3.1s.0
    cpe:2.3:o:cisco:ios_xe:3.1s.0
  • Cisco » Ios Xe » Version: 3.1s.1
    cpe:2.3:o:cisco:ios_xe:3.1s.1
  • Cisco » Ios Xe » Version: 3.1s.2
    cpe:2.3:o:cisco:ios_xe:3.1s.2
  • Cisco » Ios Xe » Version: 3.1s.3
    cpe:2.3:o:cisco:ios_xe:3.1s.3
  • Cisco » Ios Xe » Version: 3.1s.4
    cpe:2.3:o:cisco:ios_xe:3.1s.4
  • Cisco » Ios Xe » Version: 3.1s.5
    cpe:2.3:o:cisco:ios_xe:3.1s.5
  • Cisco » Ios Xe » Version: 3.1s.6
    cpe:2.3:o:cisco:ios_xe:3.1s.6
  • Cisco » Ios Xe » Version: 3.2s.0
    cpe:2.3:o:cisco:ios_xe:3.2s.0
  • Cisco » Ios Xe » Version: 3.2s.1
    cpe:2.3:o:cisco:ios_xe:3.2s.1
  • Cisco » Ios Xe » Version: 3.2s.2
    cpe:2.3:o:cisco:ios_xe:3.2s.2
  • Cisco » Ios Xe » Version: 3.2s.3
    cpe:2.3:o:cisco:ios_xe:3.2s.3
  • Cisco » Ios Xe » Version: 3.3s.0
    cpe:2.3:o:cisco:ios_xe:3.3s.0
  • Cisco » Ios Xe » Version: 3.3s.1
    cpe:2.3:o:cisco:ios_xe:3.3s.1
  • Cisco » Ios Xe » Version: 3.3s.2
    cpe:2.3:o:cisco:ios_xe:3.3s.2
  • Cisco » Ios Xe » Version: 3.5s
    cpe:2.3:o:cisco:ios_xe:3.5s
  • Cisco » Ios Xe » Version: 3.5s.0
    cpe:2.3:o:cisco:ios_xe:3.5s.0
  • Cisco » Ios Xe » Version: 3.5s.1
    cpe:2.3:o:cisco:ios_xe:3.5s.1
  • Cisco » Ios Xe » Version: 3.5s.2
    cpe:2.3:o:cisco:ios_xe:3.5s.2
  • Cisco » Ios Xe » Version: 3.6s
    cpe:2.3:o:cisco:ios_xe:3.6s
  • Cisco » Ios Xe » Version: 3.6s.0
    cpe:2.3:o:cisco:ios_xe:3.6s.0
  • Cisco » Ios Xe » Version: 3.6s.1
    cpe:2.3:o:cisco:ios_xe:3.6s.1
  • Cisco » Ios Xe » Version: 3.6s.2
    cpe:2.3:o:cisco:ios_xe:3.6s.2
  • Cisco » Ios Xe » Version: 3.7s
    cpe:2.3:o:cisco:ios_xe:3.7s
  • Cisco » Ios Xe » Version: 3.7s.0
    cpe:2.3:o:cisco:ios_xe:3.7s.0
  • Cisco » Ios Xe » Version: 3.7s.1
    cpe:2.3:o:cisco:ios_xe:3.7s.1
  • Cisco » Ios Xe » Version: 3.7s.2
    cpe:2.3:o:cisco:ios_xe:3.7s.2
  • Cisco » Ios Xe » Version: 3.7s.3
    cpe:2.3:o:cisco:ios_xe:3.7s.3
  • Cisco » Ios Xe » Version: 3.7s.4
    cpe:2.3:o:cisco:ios_xe:3.7s.4
  • Cisco » Ios Xe » Version: 3.7s.5
    cpe:2.3:o:cisco:ios_xe:3.7s.5
  • Cisco » Ios Xe » Version: 3.7s.6
    cpe:2.3:o:cisco:ios_xe:3.7s.6
  • Cisco » Ios Xe » Version: 3.7s.7
    cpe:2.3:o:cisco:ios_xe:3.7s.7
  • Cisco » Ios Xe » Version: 3.8s
    cpe:2.3:o:cisco:ios_xe:3.8s
  • Cisco » Ios Xe » Version: 3.8s.0
    cpe:2.3:o:cisco:ios_xe:3.8s.0
  • Cisco » Ios Xe » Version: 3.8s.1
    cpe:2.3:o:cisco:ios_xe:3.8s.1
  • Cisco » Ios Xe » Version: 3.8s.2
    cpe:2.3:o:cisco:ios_xe:3.8s.2
  • Cisco » Ios Xe » Version: 3.9s.0
    cpe:2.3:o:cisco:ios_xe:3.9s.0
  • Cisco » Ios Xe » Version: 3.9s.1
    cpe:2.3:o:cisco:ios_xe:3.9s.1
  • Cisco » Ios Xe » Version: 3.9s.2
    cpe:2.3:o:cisco:ios_xe:3.9s.2


Contact Us

Shodan ® - All rights reserved