Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2015-0646

Memory leak in the TCP input module in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.3.xXO, 3.5.xE, 3.6.xE, 3.8.xS through 3.10.xS before 3.10.5S, and 3.11.xS and 3.12.xS before 3.12.3S allows remote attackers to cause a denial of service (memory consumption or device reload) by sending crafted TCP packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCum94811.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.016
EPSS Ranking 80.6%
CVSS Severity
CVSS v2 Score 7.8
Products affected by CVE-2015-0646
  • Cisco » Ios » Version: 12.2
    cpe:2.3:o:cisco:ios:12.2
  • Cisco » Ios » Version: 12.4
    cpe:2.3:o:cisco:ios:12.4
  • Cisco » Ios » Version: 15.0
    cpe:2.3:o:cisco:ios:15.0
  • Cisco » Ios » Version: 15.1
    cpe:2.3:o:cisco:ios:15.1
  • Cisco » Ios » Version: 15.2
    cpe:2.3:o:cisco:ios:15.2
  • Cisco » Ios » Version: 15.3
    cpe:2.3:o:cisco:ios:15.3
  • Cisco » Ios » Version: 15.4
    cpe:2.3:o:cisco:ios:15.4
  • Cisco » Ios Xe » Version: 3.10s.0
    cpe:2.3:o:cisco:ios_xe:3.10s.0
  • Cisco » Ios Xe » Version: 3.10s.0a
    cpe:2.3:o:cisco:ios_xe:3.10s.0a
  • Cisco » Ios Xe » Version: 3.10s.1
    cpe:2.3:o:cisco:ios_xe:3.10s.1
  • Cisco » Ios Xe » Version: 3.10s.2
    cpe:2.3:o:cisco:ios_xe:3.10s.2
  • Cisco » Ios Xe » Version: 3.10s.3
    cpe:2.3:o:cisco:ios_xe:3.10s.3
  • Cisco » Ios Xe » Version: 3.10s.4
    cpe:2.3:o:cisco:ios_xe:3.10s.4
  • Cisco » Ios Xe » Version: 3.11s.0
    cpe:2.3:o:cisco:ios_xe:3.11s.0
  • Cisco » Ios Xe » Version: 3.11s.1
    cpe:2.3:o:cisco:ios_xe:3.11s.1
  • Cisco » Ios Xe » Version: 3.11s.2
    cpe:2.3:o:cisco:ios_xe:3.11s.2
  • Cisco » Ios Xe » Version: 3.11s.3
    cpe:2.3:o:cisco:ios_xe:3.11s.3
  • Cisco » Ios Xe » Version: 3.11s.4
    cpe:2.3:o:cisco:ios_xe:3.11s.4
  • Cisco » Ios Xe » Version: 3.12s.0
    cpe:2.3:o:cisco:ios_xe:3.12s.0
  • Cisco » Ios Xe » Version: 3.12s.1
    cpe:2.3:o:cisco:ios_xe:3.12s.1
  • Cisco » Ios Xe » Version: 3.3xo.0
    cpe:2.3:o:cisco:ios_xe:3.3xo.0
  • Cisco » Ios Xe » Version: 3.3xo.1
    cpe:2.3:o:cisco:ios_xe:3.3xo.1
  • Cisco » Ios Xe » Version: 3.3xo.2
    cpe:2.3:o:cisco:ios_xe:3.3xo.2
  • Cisco » Ios Xe » Version: 3.5e.0
    cpe:2.3:o:cisco:ios_xe:3.5e.0
  • Cisco » Ios Xe » Version: 3.5e.1
    cpe:2.3:o:cisco:ios_xe:3.5e.1
  • Cisco » Ios Xe » Version: 3.5e.2
    cpe:2.3:o:cisco:ios_xe:3.5e.2
  • Cisco » Ios Xe » Version: 3.5e.3
    cpe:2.3:o:cisco:ios_xe:3.5e.3
  • Cisco » Ios Xe » Version: 3.6e.0
    cpe:2.3:o:cisco:ios_xe:3.6e.0
  • Cisco » Ios Xe » Version: 3.6e.1
    cpe:2.3:o:cisco:ios_xe:3.6e.1
  • Cisco » Ios Xe » Version: 3.8s.0
    cpe:2.3:o:cisco:ios_xe:3.8s.0
  • Cisco » Ios Xe » Version: 3.8s.1
    cpe:2.3:o:cisco:ios_xe:3.8s.1
  • Cisco » Ios Xe » Version: 3.8s.2
    cpe:2.3:o:cisco:ios_xe:3.8s.2
  • Cisco » Ios Xe » Version: 3.8s_base
    cpe:2.3:o:cisco:ios_xe:3.8s_base
  • Cisco » Ios Xe » Version: 3.9s.0
    cpe:2.3:o:cisco:ios_xe:3.9s.0
  • Cisco » Ios Xe » Version: 3.9s.1
    cpe:2.3:o:cisco:ios_xe:3.9s.1
  • Cisco » Ios Xe » Version: 3.9s.2
    cpe:2.3:o:cisco:ios_xe:3.9s.2


Contact Us

Shodan ® - All rights reserved