Vulnerabilites related to cisco - accesspath
Vulnerability from fkie_nvd
Published
2000-04-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.
Impacted products
Vendor Product Version
cisco ios 11.3aa
cisco ios 12.0\(2\)
cisco ios 12.0\(2\)xc
cisco ios 12.0\(2\)xd
cisco ios 12.0\(2\)xf
cisco ios 12.0\(2\)xg
cisco ios 12.0\(3\)t2
cisco ios 12.0\(4\)
cisco ios 12.0\(4\)s
cisco ios 12.0\(4\)t
cisco ios 12.0\(5\)
cisco ios 12.0\(6\)
cisco ios 12.0\(7\)t
cisco accesspath ls-3
cisco accesspath ts-3
cisco accesspath vs-3
cisco as5200 *
cisco as5300 *
cisco as5800 *
cisco system_controller_3640 *
cisco voice_gateway_as5800 *
cisco 3660_router *
cisco 7100_router *
cisco 7200_router *
cisco 7500_router *
cisco ubr7200 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8783C0A-990A-4B79-8BF9-64E425DA585E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "77DDC99D-8B73-452C-94A7-A9A48F2F379B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
                     matchCriteriaId: "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48466C4-5A1E-4C71-8822-32D387B36B8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E23131-D207-4D98-96D5-2B71FF792604",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7109585-1433-4940-B7C9-C561DEAF1498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A0D82E1-CCF7-429B-A637-479E839EAE3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F1B2747-4A9C-44FC-BBA8-39E338B30417",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D5BB7513-C232-4B4F-BE68-972B05086ABD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCE69A3-41C6-4893-86D4-7F264352C8A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA654CE6-82C3-43D0-BAED-70E88A740BF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:accesspath:ls-3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D8CD3D5-C52F-4B38-8DA7-5441B7CD000D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:accesspath:ts-3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DD96A21-1862-4E35-BD02-2928DD44B3C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:accesspath:vs-3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D537F5F7-8227-46CC-A30F-B81C25AD9FA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:as5200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E74902A-1785-40FE-92A0-55BD27D6FEC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:as5300:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "883975E5-FE8B-4DC4-8F71-E68791ABD17D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:as5800:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "823E4E18-8719-4167-83BE-CF2DA55558E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:cisco:system_controller_3640:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7C0CC3E-3E01-4607-BE75-4A6A1074DC82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:voice_gateway_as5800:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D185F2F-788C-44F1-A635-90E33A4A88B9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:3660_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAE468C-7D0F-4F6D-B598-B2E422EFDCD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:7100_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3715102-E348-457A-9546-94BBCEF91A00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DEA083-B9BC-42DB-A4F7-986A5A185DE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:7500_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCFAA111-F831-4BC9-BCD7-246ED6C0F3FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ubr7200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4917DF-B485-46A3-9515-8BDDD1F13C77",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.",
      },
   ],
   id: "CVE-2000-0268",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2000-04-20T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/1289",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/1123",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/1289",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/1123",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-200004-0028
Vulnerability from variot

Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot. Certain versions of Cisco's IOS software have a vulnerability in the Telnet Environment handling code. This attack can be launched repeatedly thereby effecting a Denial of Service attack. Cisco Internet Operating System (IOS) is an operating system used on CISCO routers. < Link: http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml >

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200004-0028",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(4\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(2\\)xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(2\\)xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(2\\)xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "11.3aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(2\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(4\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(4\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(3\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(2\\)xf",
         },
         {
            model: "as5300",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)",
         },
         {
            model: "7200 router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "3660 router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "accesspath",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "vs-3",
         },
         {
            model: "as5800",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ubr7200",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "voice gateway as5800",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "7100 router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)t",
         },
         {
            model: "accesspath",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "ls-3",
         },
         {
            model: "as5200",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(6\\)",
         },
         {
            model: "system controller 3640",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "7500 router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "accesspath",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "ts-3",
         },
         {
            model: "voice gateway as5800",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "system controller sc3640",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.5",
         },
         {
            model: "ios t",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios s",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios t2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.3",
         },
         {
            model: "ios xg",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xf",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xd",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xc",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios 11.3aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "cable router ubr7200",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "accesspath vs-3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "accesspath ts-3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "accesspath ls-3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access server as5800",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access server as5300",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access server as5200",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7500",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7200",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7100",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "1123",
         },
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:as5300:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:system_controller_3640:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:accesspath:ls-3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:accesspath:ts-3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:accesspath:vs-3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:as5200:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:as5800:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:voice_gateway_as5800:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:3660_router:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:7100_router:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:ubr7200:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:7500_router:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This vulnerability was originally discovered with a version of CyberCop Scanner from Network Associates. The public release of this information was in a Cisco security advisory posted to the Bugtraq mailing list on April 19, 2000.",
      sources: [
         {
            db: "BID",
            id: "1123",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2000-0268",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-1847",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2000-0268",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200004-051",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-1847",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1847",
         },
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot. Certain versions of Cisco's IOS software have a vulnerability in the Telnet Environment handling code. This attack can be launched repeatedly thereby effecting a Denial of Service attack. Cisco Internet Operating System (IOS) is an operating system used on CISCO routers. < *Link: http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml* >",
      sources: [
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            db: "BID",
            id: "1123",
         },
         {
            db: "VULHUB",
            id: "VHN-1847",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "1123",
            trust: 2,
         },
         {
            db: "NVD",
            id: "CVE-2000-0268",
            trust: 1.7,
         },
         {
            db: "OSVDB",
            id: "1289",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
            trust: 0.7,
         },
         {
            db: "NSFOCUS",
            id: "460",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20000420 CISCO IOS SOFTWARE TELNET OPTION HANDLING VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-1847",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1847",
         },
         {
            db: "BID",
            id: "1123",
         },
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   id: "VAR-200004-0028",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1847",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:16:23.280000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/1123",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/1289",
         },
         {
            trust: 0.6,
            url: "http://www.nsfocus.net/vulndb/460",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/sec_incident_response.shtml",
         },
         {
            trust: 0.1,
            url: "",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1847",
         },
         {
            db: "BID",
            id: "1123",
         },
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-1847",
         },
         {
            db: "BID",
            id: "1123",
         },
         {
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2000-04-20T00:00:00",
            db: "VULHUB",
            id: "VHN-1847",
         },
         {
            date: "2000-04-20T00:00:00",
            db: "BID",
            id: "1123",
         },
         {
            date: "2000-04-20T04:00:00",
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            date: "2000-04-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-09-10T00:00:00",
            db: "VULHUB",
            id: "VHN-1847",
         },
         {
            date: "2000-04-20T00:00:00",
            db: "BID",
            id: "1123",
         },
         {
            date: "2008-09-10T19:03:47.867000",
            db: "NVD",
            id: "CVE-2000-0268",
         },
         {
            date: "2006-08-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS TELNET Environment Variable Handling Denial of Service Vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200004-051",
         },
      ],
      trust: 0.6,
   },
}

CVE-2000-0268 (GCVE-0-2000-0268)
Vulnerability from cvelistv5
Published
2000-06-02 04:00
Modified
2024-08-08 05:14
Severity ?
Summary
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.
References
http://www.securityfocus.com/bid/1123vdb-entry, x_refsource_BID
http://www.osvdb.org/1289vdb-entry, x_refsource_OSVDB
http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtmlvendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:14:20.398Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1123",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/1123",
               },
               {
                  name: "1289",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/1289",
               },
               {
                  name: "20000420 Cisco IOS Software TELNET Option Handling Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-04-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2004-09-02T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1123",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/1123",
            },
            {
               name: "1289",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/1289",
            },
            {
               name: "20000420 Cisco IOS Software TELNET Option Handling Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-0268",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1123",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/1123",
                  },
                  {
                     name: "1289",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/1289",
                  },
                  {
                     name: "20000420 Cisco IOS Software TELNET Option Handling Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-0268",
      datePublished: "2000-06-02T04:00:00",
      dateReserved: "2000-04-26T00:00:00",
      dateUpdated: "2024-08-08T05:14:20.398Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}