Be in love with vulnerability scanning

Mageni is a powerful and easy vulnerability scanner used by companies of all sizes. You will be in love with Mageni's powerful features, ease of use and price. Free for 7-days then $39 monthly for infinite IPs.

Start now 

No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.

App screenshot

CVE-2015-0631

CVE information

Published

7 years ago

Last Modified

7 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688..

CVSSv2.0 Score

Severity
High
Base Score
7.1/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:cisco:ips_sensor_software:7.2\(2\)e4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:cisco:ips_sensor_software:7.2\(1\)e4:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ids_4235:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ips_4270:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ids_4250_xl:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ids_4250:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ips_4260:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ids_4210:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ids_4230:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ips_4255:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ids_4220:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ids_4215:*:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:cisco:ips_4240:*:*:*:*:*:*:*:*
  No
-

Every 11 seconds there is a ransomware attack.

Mageni can help you manage this threat by understanding your vulnerabilities and prioritizing the remediation.

Sign up for free