VAR-201503-0162
Vulnerability from variot - Updated: 2025-04-13 23:39The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Successfully exploiting this issue may allow an attacker to execute arbitrary commands with the security context of the root user. This issue is being tracked by Cisco bug ID CSCur14589. Cisco NX-OS is a data center-oriented operating system developed by Cisco
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201503-0162",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nx-os for nexus series 5.0 u5",
"scope": "eq",
"trust": 2.7,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os for nexus series 6.0 n2",
"scope": "eq",
"trust": 1.8,
"vendor": "cisco",
"version": "6000"
},
{
"model": "nx-os for nexus series 6.0 n2",
"scope": "eq",
"trust": 1.8,
"vendor": "cisco",
"version": "5000"
},
{
"model": "nx-os for nexus series 6.0 u2",
"scope": "eq",
"trust": 1.8,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u4\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.1\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u2\\(5\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u3\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u4\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u2\\(6\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u3\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u3\\(5\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u3\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "6.0\\(2\\)u3\\(4\\)"
},
{
"model": "nx-os for nexus series 6.1 i2",
"scope": "eq",
"trust": 1.5,
"vendor": "cisco",
"version": "9000"
},
{
"model": "nx-os for nexus series 6.0 u3",
"scope": "eq",
"trust": 1.5,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os for nexus series 6.0 u1",
"scope": "eq",
"trust": 1.5,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os",
"scope": null,
"trust": 1.4,
"vendor": "cisco",
"version": null
},
{
"model": "nx-os for nexus series 6.2",
"scope": "eq",
"trust": 1.2,
"vendor": "cisco",
"version": "7000"
},
{
"model": "nx-os for nexus series 7.0 n1",
"scope": "eq",
"trust": 1.2,
"vendor": "cisco",
"version": "6000"
},
{
"model": "nx-os for nexus series 7.0 n1",
"scope": "eq",
"trust": 1.2,
"vendor": "cisco",
"version": "5000"
},
{
"model": "nx-os for nexus series 5.0 u3",
"scope": "eq",
"trust": 1.2,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n1\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n2\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n2\\(5\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i2\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i2\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n2\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i3\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u3\\(2b\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1e\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1f\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(2a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(4a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(8a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1c\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i2\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.0\\(1c\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1d\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(6\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i3\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u3\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1h\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n2\\(4\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(4\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n1\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n2\\(1b\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u2\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i2\\(2b\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u2\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(6b\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u3\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u4\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u5\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(8b\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1b\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i2\\(2a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)i3\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n2\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.0\\(2\\)n1\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u1\\(1a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u2\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)n1\\(2a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.0\\(0\\)n1\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.0\\(3\\)n1\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u5\\(1g\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u1\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u4\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u1\\(3\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "5.0\\(3\\)u3\\(2a\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u1\\(4\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.0\\(1\\)n1\\(1\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u1\\(2\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)u2\\(4\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(8\\)"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "11.0\\(1b\\)"
},
{
"model": "nx-os for nexus series 6.1 i3",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "9000"
},
{
"model": "nx-os for nexus series 6.0 u4",
"scope": "eq",
"trust": 0.9,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os for nexus series 11.0",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "9000"
},
{
"model": "nx-os for nexus series 6.0 n1",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "6000"
},
{
"model": "nx-os for nexus series 6.0 n1",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "5000"
},
{
"model": "nx-os for nexus series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70006.2(8)"
},
{
"model": "nx-os for nexus series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70006.2(6)"
},
{
"model": "nx-os for nexus series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70006.2(2)"
},
{
"model": "nx-os for nexus series 6.1",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7000"
},
{
"model": "nx-os for nexus series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70006.1(4)"
},
{
"model": "nx-os for nexus series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70006.1(3)"
},
{
"model": "nx-os for nexus series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70006.1(2)"
},
{
"model": "nx-os for nexus series 6.0 u5",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3000"
},
{
"model": "nx-os for nexus series 5.0 u4",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3000"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "BID",
"id": "73390"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:nx-os",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "73390"
}
],
"trust": 0.3
},
"cve": "CVE-2015-0658",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 5.5,
"id": "CVE-2015-0658",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.2,
"id": "CNVD-2015-02076",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 5.5,
"id": "VHN-78604",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:A/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-0658",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-0658",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2015-02076",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201503-609",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-78604",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "VULHUB",
"id": "VHN-78604"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary commands with the security context of the root user. \nThis issue is being tracked by Cisco bug ID CSCur14589. Cisco NX-OS is a data center-oriented operating system developed by Cisco",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0658"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "BID",
"id": "73390"
},
{
"db": "VULHUB",
"id": "VHN-78604"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-0658",
"trust": 3.4
},
{
"db": "SECTRACK",
"id": "1031992",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201503-609",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-02076",
"trust": 0.6
},
{
"db": "BID",
"id": "73390",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-78604",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "VULHUB",
"id": "VHN-78604"
},
{
"db": "BID",
"id": "73390"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"id": "VAR-201503-0162",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "VULHUB",
"id": "VHN-78604"
}
],
"trust": 0.06999999999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
}
]
},
"last_update_date": "2025-04-13T23:39:39.125000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "38062",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062"
},
{
"title": "Patch for Cisco NX-OS PowerOn Auto Provisioning (POAP) arbitrary command execution vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/56775"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78604"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38062"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1031992"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0658"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0658"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "VULHUB",
"id": "VHN-78604"
},
{
"db": "BID",
"id": "73390"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"db": "VULHUB",
"id": "VHN-78604"
},
{
"db": "BID",
"id": "73390"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-03-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"date": "2015-03-28T00:00:00",
"db": "VULHUB",
"id": "VHN-78604"
},
{
"date": "2015-03-27T00:00:00",
"db": "BID",
"id": "73390"
},
{
"date": "2015-03-31T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"date": "2015-03-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"date": "2015-03-28T01:59:49.210000",
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-03-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-02076"
},
{
"date": "2015-10-22T00:00:00",
"db": "VULHUB",
"id": "VHN-78604"
},
{
"date": "2015-03-27T00:00:00",
"db": "BID",
"id": "73390"
},
{
"date": "2015-03-31T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-001987"
},
{
"date": "2015-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201503-609"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-0658"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco NX-OS of PowerOn Auto Provisioning Functional DHCP In the implementation of root As an arbitrary command execution vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-001987"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201503-609"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.