Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2015-0645

The Layer 4 Redirect (L4R) feature in Cisco IOS XE 2.x and 3.x before 3.10.4S, 3.11 before 3.11.3S, 3.12 before 3.12.2S, 3.13 before 3.13.1S, 3.14 before 3.14.0S, and 3.15 before 3.15.0S allows remote attackers to cause a denial of service (device reload) via malformed (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCuq59131.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 77.1%
CVSS Severity
CVSS v2 Score 7.8
Products affected by CVE-2015-0645
  • Cisco » Ios Xe » Version: 3.10s.0
    cpe:2.3:o:cisco:ios_xe:3.10s.0
  • Cisco » Ios Xe » Version: 3.10s.0a
    cpe:2.3:o:cisco:ios_xe:3.10s.0a
  • Cisco » Ios Xe » Version: 3.10s.1
    cpe:2.3:o:cisco:ios_xe:3.10s.1
  • Cisco » Ios Xe » Version: 3.10s.2
    cpe:2.3:o:cisco:ios_xe:3.10s.2
  • Cisco » Ios Xe » Version: 3.10s.3
    cpe:2.3:o:cisco:ios_xe:3.10s.3
  • Cisco » Ios Xe » Version: 3.11s.0
    cpe:2.3:o:cisco:ios_xe:3.11s.0
  • Cisco » Ios Xe » Version: 3.11s.1
    cpe:2.3:o:cisco:ios_xe:3.11s.1
  • Cisco » Ios Xe » Version: 3.11s.2
    cpe:2.3:o:cisco:ios_xe:3.11s.2
  • Cisco » Ios Xe » Version: 3.12s.0
    cpe:2.3:o:cisco:ios_xe:3.12s.0
  • Cisco » Ios Xe » Version: 3.12s.1
    cpe:2.3:o:cisco:ios_xe:3.12s.1
  • Cisco » Ios Xe » Version: 3.13s.0
    cpe:2.3:o:cisco:ios_xe:3.13s.0
  • Cisco » Ios Xe » Version: 3.1s.0
    cpe:2.3:o:cisco:ios_xe:3.1s.0
  • Cisco » Ios Xe » Version: 3.1s.1
    cpe:2.3:o:cisco:ios_xe:3.1s.1
  • Cisco » Ios Xe » Version: 3.1s.2
    cpe:2.3:o:cisco:ios_xe:3.1s.2
  • Cisco » Ios Xe » Version: 3.1s.3
    cpe:2.3:o:cisco:ios_xe:3.1s.3
  • Cisco » Ios Xe » Version: 3.1s.4
    cpe:2.3:o:cisco:ios_xe:3.1s.4
  • Cisco » Ios Xe » Version: 3.1s.5
    cpe:2.3:o:cisco:ios_xe:3.1s.5
  • Cisco » Ios Xe » Version: 3.1s.6
    cpe:2.3:o:cisco:ios_xe:3.1s.6
  • Cisco » Ios Xe » Version: 3.2s.0
    cpe:2.3:o:cisco:ios_xe:3.2s.0
  • Cisco » Ios Xe » Version: 3.2s.1
    cpe:2.3:o:cisco:ios_xe:3.2s.1
  • Cisco » Ios Xe » Version: 3.2s.2
    cpe:2.3:o:cisco:ios_xe:3.2s.2
  • Cisco » Ios Xe » Version: 3.2s.3
    cpe:2.3:o:cisco:ios_xe:3.2s.3
  • Cisco » Ios Xe » Version: 3.3s.0
    cpe:2.3:o:cisco:ios_xe:3.3s.0
  • Cisco » Ios Xe » Version: 3.3s.1
    cpe:2.3:o:cisco:ios_xe:3.3s.1
  • Cisco » Ios Xe » Version: 3.3s.2
    cpe:2.3:o:cisco:ios_xe:3.3s.2
  • Cisco » Ios Xe » Version: 3.4s.0
    cpe:2.3:o:cisco:ios_xe:3.4s.0
  • Cisco » Ios Xe » Version: 3.4s.1
    cpe:2.3:o:cisco:ios_xe:3.4s.1
  • Cisco » Ios Xe » Version: 3.4s.2
    cpe:2.3:o:cisco:ios_xe:3.4s.2
  • Cisco » Ios Xe » Version: 3.4s.3
    cpe:2.3:o:cisco:ios_xe:3.4s.3
  • Cisco » Ios Xe » Version: 3.4s.4
    cpe:2.3:o:cisco:ios_xe:3.4s.4
  • Cisco » Ios Xe » Version: 3.4s.5
    cpe:2.3:o:cisco:ios_xe:3.4s.5
  • Cisco » Ios Xe » Version: 3.4s.6
    cpe:2.3:o:cisco:ios_xe:3.4s.6
  • Cisco » Ios Xe » Version: 3.5s.0
    cpe:2.3:o:cisco:ios_xe:3.5s.0
  • Cisco » Ios Xe » Version: 3.5s.1
    cpe:2.3:o:cisco:ios_xe:3.5s.1
  • Cisco » Ios Xe » Version: 3.5s.2
    cpe:2.3:o:cisco:ios_xe:3.5s.2
  • Cisco » Ios Xe » Version: 3.5s_base
    cpe:2.3:o:cisco:ios_xe:3.5s_base
  • Cisco » Ios Xe » Version: 3.6s.0
    cpe:2.3:o:cisco:ios_xe:3.6s.0
  • Cisco » Ios Xe » Version: 3.6s.1
    cpe:2.3:o:cisco:ios_xe:3.6s.1
  • Cisco » Ios Xe » Version: 3.6s.2
    cpe:2.3:o:cisco:ios_xe:3.6s.2
  • Cisco » Ios Xe » Version: 3.6s_base
    cpe:2.3:o:cisco:ios_xe:3.6s_base


Contact Us

Shodan ® - All rights reserved