Vulnerability Name: | CVE-2015-4185 (CCN-103826) | ||||||||
Assigned: | 2015-06-12 | ||||||||
Published: | 2015-06-12 | ||||||||
Updated: | 2017-01-04 | ||||||||
Summary: | The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202. | ||||||||
CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C) 5.1 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
4.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-4185 Source: CCN Type: Cisco Vulnerability Alert 39343 Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability Source: CISCO Type: Vendor Advisory 20150612 Cisco IOS Software TCL Script Interpreter Privilege Escalation Vulnerability Source: BID Type: Third Party Advisory, VDB Entry 72310 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1032581 Source: XF Type: UNKNOWN ciscoios-cve20154185-priv-esc(103826) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |