3.5
CVSSv2

CVE-2015-6423

Published: 15/01/2016 Updated: 11/08/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

The DCERPC Inspection implementation in Cisco Adaptive Security Appliance (ASA) Software 9.4.1 up to and including 9.5.1 allows remote authenticated users to bypass an intended DCERPC-only ACL by sending arbitrary network traffic, aka Bug ID CSCuu67782.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco adaptive security appliance software 9.4.1.2

cisco adaptive security appliance software 9.4.2

cisco adaptive security appliance software 9.5.1

cisco adaptive security appliance software 9.4.1.5

cisco adaptive security appliance software 9.4.1.3

cisco adaptive security appliance software 9.4.1

cisco adaptive security appliance software 9.4.1.1

Vendor Advisories

A vulnerability in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) Inspection feature of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to send traffic that is not DCERPC between hosts configured only for DCERPC inspection The DCERPC traffic should be allowed only on TCP port 135 ...