Rapid7 Vulnerability & Exploit Database

Cisco SAN-OS: Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability (CVE-2015-0775)

Back to Search

Cisco SAN-OS: Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability (CVE-2015-0775)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
06/12/2015
Created
07/25/2018
Added
01/19/2017
Modified
01/19/2017

Description

The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182.

Solution(s)

  • cisco-update-sanos

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;