6.3
CVSSv2

CVE-2015-6263

Published: 12/10/2015 Updated: 04/01/2017
CVSS v2 Base Score: 6.3 | Impact Score: 6.9 | Exploitability Score: 6.8
VMScore: 561
Vector: AV:N/AC:M/Au:S/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the RADIUS client feature of Cisco IOS Software could allow an authenticated, remote malicious user to cause a reload of the affected device. The vulnerability is due to improper parsing of malformed RADIUS packets returned by a RADIUS server. An attacker could exploit this vulnerability by configuring a RADIUS server with a shared RADIUS secret and returning malformed answers back to a RADIUS client on an affected Cisco device. An exploit could allow the malicious user to cause a reload of the affected device. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151005-ios-radius

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 15.4\\(3\\)m2.2

Vendor Advisories

A vulnerability in the RADIUS client feature of Cisco IOS Software could allow an authenticated, remote attacker to cause a reload of the affected device The vulnerability is due to improper parsing of malformed RADIUS packets returned by a RADIUS server An attacker could exploit this vulnerability by configuring a RADIUS server with a shared RA ...