CVE-2015-4265
Published Oct 12, 2015
Last updated 8 years ago
Overview
- Description
- Cisco Unified Computing System (UCS) B Blade Server Software 2.2.x before 2.2.6 allows local users to cause a denial of service (host OS or BMC hang) by sending crafted packets over the Inter-IC (I2C) bus, aka Bug ID CSCuq77241.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "618F971C-6113-49F6-90D1-6862C2D17948" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1c\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C015795-B76E-4F24-86B2-E17869A0C459" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "975EFA1E-8578-4790-A29C-5DE6C980152E" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13924F04-D044-4488-BA5B-1B915A21E7F9" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1f\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F607912-394A-4124-A202-53F4CD182CD8" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1g\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15920997-2E9A-4868-B2E3-3330DA0D6A17" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(1h\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "095B2AD0-1A47-42FF-B1D2-CF519812986A" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(2c\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E68B085-7FC9-44FE-9876-1D43373B5F4C" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(2d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64D627B9-2DDB-4FD9-8B94-BA09EF5DDE1A" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(2e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6666C18F-7FD2-4FF0-82E9-E44CFCCBBEE7" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1FC54BC-B337-4986-89CE-EF7E7EA962BE" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "583FD08B-8E76-4571-89FA-325CB862B56D" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3c\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40260D3F-CF27-41F4-B9F2-07079E3FDB2D" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D670F3BA-1C5D-4EE7-8B7C-30069EA200DD" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B7BC793-B083-4622-97A2-E7E63A7C9E05" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3f\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5E3BB69-7636-493D-8FB7-140A443283C2" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(3g\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B051774C-D38E-4B2D-B6E8-3BF75CE783D2" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(4b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFC2C831-FF0F-4A65-9072-31DF9F9A54DC" }, { "criteria": "cpe:2.3:a:cisco:ucs_b-series_blade_server_software:2.2\\(5a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "242A27AE-97B1-451E-9769-C6918134682A" } ], "operator": "OR" } ] } ]