Search criteria
12 vulnerabilities found for aironet_ap1100 by cisco
FKIE_CVE-2012-1350
Vulnerability from fkie_nvd - Published: 2012-08-06 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.3 | |
| cisco | ios | 12.3\(1a\) | |
| cisco | ios | 12.3\(2\)ja | |
| cisco | ios | 12.3\(2\)ja5 | |
| cisco | ios | 12.3\(2\)jk | |
| cisco | ios | 12.3\(2\)jk1 | |
| cisco | ios | 12.3\(2\)t3 | |
| cisco | ios | 12.3\(2\)t8 | |
| cisco | ios | 12.3\(2\)xa4 | |
| cisco | ios | 12.3\(2\)xa5 | |
| cisco | ios | 12.3\(2\)xc1 | |
| cisco | ios | 12.3\(2\)xc2 | |
| cisco | ios | 12.3\(2\)xc3 | |
| cisco | ios | 12.3\(2\)xc4 | |
| cisco | ios | 12.3\(2\)xe3 | |
| cisco | ios | 12.3\(2\)xe4 | |
| cisco | ios | 12.3\(3e\) | |
| cisco | ios | 12.3\(3h\) | |
| cisco | ios | 12.3\(3i\) | |
| cisco | ios | 12.3\(4\)eo1 | |
| cisco | ios | 12.3\(4\)ja | |
| cisco | ios | 12.3\(4\)ja1 | |
| cisco | ios | 12.3\(4\)t | |
| cisco | ios | 12.3\(4\)t1 | |
| cisco | ios | 12.3\(4\)t2 | |
| cisco | ios | 12.3\(4\)t3 | |
| cisco | ios | 12.3\(4\)t4 | |
| cisco | ios | 12.3\(4\)t8 | |
| cisco | ios | 12.3\(4\)tpc11a | |
| cisco | ios | 12.3\(4\)xd | |
| cisco | ios | 12.3\(4\)xd1 | |
| cisco | ios | 12.3\(4\)xd2 | |
| cisco | ios | 12.3\(4\)xe4 | |
| cisco | ios | 12.3\(4\)xg1 | |
| cisco | ios | 12.3\(4\)xg2 | |
| cisco | ios | 12.3\(4\)xg4 | |
| cisco | ios | 12.3\(4\)xg5 | |
| cisco | ios | 12.3\(4\)xh | |
| cisco | ios | 12.3\(4\)xk | |
| cisco | ios | 12.3\(4\)xk1 | |
| cisco | ios | 12.3\(4\)xk3 | |
| cisco | ios | 12.3\(4\)xk4 | |
| cisco | ios | 12.3\(4\)xq | |
| cisco | ios | 12.3\(4\)xq1 | |
| cisco | ios | 12.3\(5\) | |
| cisco | ios | 12.3\(5\)b1 | |
| cisco | ios | 12.3\(5a\) | |
| cisco | ios | 12.3\(5a\)b | |
| cisco | ios | 12.3\(5a\)b2 | |
| cisco | ios | 12.3\(5a\)b5 | |
| cisco | ios | 12.3\(5b\) | |
| cisco | ios | 12.3\(5c\) | |
| cisco | ios | 12.3\(5e\) | |
| cisco | ios | 12.3\(5f\) | |
| cisco | ios | 12.3\(6\) | |
| cisco | ios | 12.3\(6a\) | |
| cisco | ios | 12.3\(6d\) | |
| cisco | ios | 12.3\(6e\) | |
| cisco | ios | 12.3\(6f\) | |
| cisco | ios | 12.3\(7\)ja | |
| cisco | ios | 12.3\(7\)ja1 | |
| cisco | ios | 12.3\(7\)jx | |
| cisco | ios | 12.3\(7\)t | |
| cisco | ios | 12.3\(7\)t4 | |
| cisco | ios | 12.3\(7\)t8 | |
| cisco | ios | 12.3\(7\)t9 | |
| cisco | ios | 12.3\(7\)t10 | |
| cisco | ios | 12.3\(7\)t12 | |
| cisco | ios | 12.3\(7\)xi3 | |
| cisco | ios | 12.3\(7\)xi4 | |
| cisco | ios | 12.3\(7\)xi7 | |
| cisco | ios | 12.3\(7\)xr3 | |
| cisco | ios | 12.3\(7\)xr4 | |
| cisco | ios | 12.3\(7\)xr6 | |
| cisco | ios | 12.3\(7.7\) | |
| cisco | ios | 12.3\(8\)ja | |
| cisco | ios | 12.3\(8\)ja1 | |
| cisco | ios | 12.3\(8\)t4 | |
| cisco | ios | 12.3\(8\)t7 | |
| cisco | ios | 12.3\(8\)t8 | |
| cisco | ios | 12.3\(8\)t9 | |
| cisco | ios | 12.3\(8\)t11 | |
| cisco | ios | 12.3\(8\)xu2 | |
| cisco | ios | 12.3\(8\)xy4 | |
| cisco | ios | 12.3\(8\)xy5 | |
| cisco | ios | 12.3\(8\)xy6 | |
| cisco | ios | 12.3\(8\)ya1 | |
| cisco | ios | 12.3\(8\)yd | |
| cisco | ios | 12.3\(8\)yf | |
| cisco | ios | 12.3\(8\)yg | |
| cisco | ios | 12.3\(8\)yg1 | |
| cisco | ios | 12.3\(8\)yg2 | |
| cisco | ios | 12.3\(8\)yg3 | |
| cisco | ios | 12.3\(8\)yh | |
| cisco | ios | 12.3\(8\)yi | |
| cisco | ios | 12.3\(8\)yi1 | |
| cisco | ios | 12.3\(8\)yi3 | |
| cisco | ios | 12.3\(9\) | |
| cisco | ios | 12.3\(9a\)bc | |
| cisco | ios | 12.3\(9a\)bc2 | |
| cisco | ios | 12.3\(9a\)bc6 | |
| cisco | ios | 12.3\(9a\)bc7 | |
| cisco | ios | 12.3\(9d\) | |
| cisco | ios | 12.3\(9e\) | |
| cisco | ios | 12.3\(10\) | |
| cisco | ios | 12.3\(10c\) | |
| cisco | ios | 12.3\(10d\) | |
| cisco | ios | 12.3\(10e\) | |
| cisco | ios | 12.3\(11\) | |
| cisco | ios | 12.3\(11\)t | |
| cisco | ios | 12.3\(11\)t4 | |
| cisco | ios | 12.3\(11\)t5 | |
| cisco | ios | 12.3\(11\)t6 | |
| cisco | ios | 12.3\(11\)t8 | |
| cisco | ios | 12.3\(11\)t9 | |
| cisco | ios | 12.3\(11\)xl | |
| cisco | ios | 12.3\(11\)xl3 | |
| cisco | ios | 12.3\(11\)yf | |
| cisco | ios | 12.3\(11\)yf2 | |
| cisco | ios | 12.3\(11\)yf3 | |
| cisco | ios | 12.3\(11\)yf4 | |
| cisco | ios | 12.3\(11\)yj | |
| cisco | ios | 12.3\(11\)yk | |
| cisco | ios | 12.3\(11\)yk1 | |
| cisco | ios | 12.3\(11\)yk2 | |
| cisco | ios | 12.3\(11\)yl | |
| cisco | ios | 12.3\(11\)yn | |
| cisco | ios | 12.3\(11\)yr | |
| cisco | ios | 12.3\(11\)ys | |
| cisco | ios | 12.3\(11\)ys1 | |
| cisco | ios | 12.3\(11\)yw | |
| cisco | ios | 12.3\(12\) | |
| cisco | ios | 12.3\(12b\) | |
| cisco | ios | 12.3\(12e\) | |
| cisco | ios | 12.3\(13\) | |
| cisco | ios | 12.3\(13a\) | |
| cisco | ios | 12.3\(13a\)bc | |
| cisco | ios | 12.3\(13a\)bc1 | |
| cisco | ios | 12.3\(13b\) | |
| cisco | ios | 12.3\(14\)t | |
| cisco | ios | 12.3\(14\)t2 | |
| cisco | ios | 12.3\(14\)t4 | |
| cisco | ios | 12.3\(14\)t5 | |
| cisco | ios | 12.3\(14\)ym4 | |
| cisco | ios | 12.3\(14\)yq | |
| cisco | ios | 12.3\(14\)yq1 | |
| cisco | ios | 12.3\(14\)yq3 | |
| cisco | ios | 12.3\(14\)yq4 | |
| cisco | ios | 12.3\(14\)yt | |
| cisco | ios | 12.3\(14\)yt1 | |
| cisco | ios | 12.3\(14\)yu | |
| cisco | ios | 12.3\(14\)yu1 | |
| cisco | ios | 12.3\(15\) | |
| cisco | ios | 12.3\(15b\) | |
| cisco | ios | 12.3\(16\) | |
| cisco | ios | 12.3b | |
| cisco | ios | 12.3bc | |
| cisco | ios | 12.3bw | |
| cisco | ios | 12.3j | |
| cisco | ios | 12.3ja | |
| cisco | ios | 12.3jea | |
| cisco | ios | 12.3jeb | |
| cisco | ios | 12.3jec | |
| cisco | ios | 12.3jed | |
| cisco | ios | 12.3jk | |
| cisco | ios | 12.3jl | |
| cisco | ios | 12.3jx | |
| cisco | ios | 12.3t | |
| cisco | ios | 12.3tpc | |
| cisco | ios | 12.3va | |
| cisco | ios | 12.3xa | |
| cisco | ios | 12.3xb | |
| cisco | ios | 12.3xc | |
| cisco | ios | 12.3xd | |
| cisco | ios | 12.3xe | |
| cisco | ios | 12.3xf | |
| cisco | ios | 12.3xg | |
| cisco | ios | 12.3xh | |
| cisco | ios | 12.3xi | |
| cisco | ios | 12.3xj | |
| cisco | ios | 12.3xk | |
| cisco | ios | 12.3xl | |
| cisco | ios | 12.3xm | |
| cisco | ios | 12.3xn | |
| cisco | ios | 12.3xq | |
| cisco | ios | 12.3xr | |
| cisco | ios | 12.3xs | |
| cisco | ios | 12.3xt | |
| cisco | ios | 12.3xu | |
| cisco | ios | 12.3xv | |
| cisco | ios | 12.3xw | |
| cisco | ios | 12.3xx | |
| cisco | ios | 12.3xy | |
| cisco | ios | 12.3xz | |
| cisco | ios | 12.3ya | |
| cisco | ios | 12.3yb | |
| cisco | ios | 12.3yc | |
| cisco | ios | 12.3yd | |
| cisco | ios | 12.3ye | |
| cisco | ios | 12.3yf | |
| cisco | ios | 12.3yg | |
| cisco | ios | 12.3yh | |
| cisco | ios | 12.3yi | |
| cisco | ios | 12.3yj | |
| cisco | ios | 12.3yk | |
| cisco | ios | 12.3yl | |
| cisco | ios | 12.3ym | |
| cisco | ios | 12.3yn | |
| cisco | ios | 12.3yq | |
| cisco | ios | 12.3yr | |
| cisco | ios | 12.3ys | |
| cisco | ios | 12.3yt | |
| cisco | ios | 12.3yu | |
| cisco | ios | 12.3yw | |
| cisco | ios | 12.3yx | |
| cisco | ios | 12.3yz | |
| cisco | ios | 12.3za | |
| cisco | ios | 12.4 | |
| cisco | ios | 12.4\(1\) | |
| cisco | ios | 12.4\(1b\) | |
| cisco | ios | 12.4\(1c\) | |
| cisco | ios | 12.4\(2\)mr | |
| cisco | ios | 12.4\(2\)mr1 | |
| cisco | ios | 12.4\(2\)t | |
| cisco | ios | 12.4\(2\)t1 | |
| cisco | ios | 12.4\(2\)t2 | |
| cisco | ios | 12.4\(2\)t3 | |
| cisco | ios | 12.4\(2\)t4 | |
| cisco | ios | 12.4\(2\)xa | |
| cisco | ios | 12.4\(2\)xb | |
| cisco | ios | 12.4\(2\)xb2 | |
| cisco | ios | 12.4\(3\) | |
| cisco | ios | 12.4\(3\)t2 | |
| cisco | ios | 12.4\(3a\) | |
| cisco | ios | 12.4\(3b\) | |
| cisco | ios | 12.4\(3d\) | |
| cisco | ios | 12.4\(4\)mr | |
| cisco | ios | 12.4\(4\)t | |
| cisco | ios | 12.4\(4\)t2 | |
| cisco | ios | 12.4\(5\) | |
| cisco | ios | 12.4\(5b\) | |
| cisco | ios | 12.4\(6\)t | |
| cisco | ios | 12.4\(6\)t1 | |
| cisco | ios | 12.4\(7\) | |
| cisco | ios | 12.4\(7a\) | |
| cisco | ios | 12.4\(8\) | |
| cisco | ios | 12.4\(9\)t | |
| cisco | ios | 12.4\(11\)md | |
| cisco | ios | 12.4\(15\)md | |
| cisco | ios | 12.4\(22\)md | |
| cisco | ios | 12.4\(22\)mda | |
| cisco | ios | 12.4\(23\) | |
| cisco | ios | 12.4\(24\)md | |
| cisco | ios | 12.4\(24\)md1 | |
| cisco | ios | 12.4\(24\)md2 | |
| cisco | ios | 12.4\(24\)md3 | |
| cisco | ios | 12.4\(24\)md4 | |
| cisco | ios | 12.4\(24\)mda | |
| cisco | ios | 12.4\(24\)t1 | |
| cisco | ios | 12.4gc | |
| cisco | ios | 12.4ja | |
| cisco | ios | 12.4jda | |
| cisco | ios | 12.4jdc | |
| cisco | ios | 12.4jdd | |
| cisco | ios | 12.4jk | |
| cisco | ios | 12.4jl | |
| cisco | ios | 12.4jma | |
| cisco | ios | 12.4jmb | |
| cisco | ios | 12.4jx | |
| cisco | ios | 12.4md | |
| cisco | ios | 12.4mda | |
| cisco | ios | 12.4mdb | |
| cisco | ios | 12.4mr | |
| cisco | ios | 12.4mra | |
| cisco | ios | 12.4mrb | |
| cisco | ios | 12.4sw | |
| cisco | ios | 12.4t | |
| cisco | ios | 12.4xa | |
| cisco | ios | 12.4xb | |
| cisco | ios | 12.4xc | |
| cisco | ios | 12.4xd | |
| cisco | ios | 12.4xe | |
| cisco | ios | 12.4xf | |
| cisco | ios | 12.4xg | |
| cisco | ios | 12.4xj | |
| cisco | ios | 12.4xk | |
| cisco | ios | 12.4xl | |
| cisco | ios | 12.4xm | |
| cisco | ios | 12.4xn | |
| cisco | ios | 12.4xp | |
| cisco | ios | 12.4xq | |
| cisco | ios | 12.4xr | |
| cisco | ios | 12.4xt | |
| cisco | ios | 12.4xv | |
| cisco | ios | 12.4xw | |
| cisco | ios | 12.4xy | |
| cisco | ios | 12.4xz | |
| cisco | ios | 12.4ya | |
| cisco | ios | 12.4yb | |
| cisco | ios | 12.4yd | |
| cisco | ios | 12.4ye | |
| cisco | ios | 12.4yg | |
| cisco | aironet_1040 | - | |
| cisco | aironet_1140 | - | |
| cisco | aironet_1260 | - | |
| cisco | aironet_3500 | - | |
| cisco | aironet_3600 | - | |
| cisco | aironet_600_office_extend | - | |
| cisco | aironet_ap1100 | * | |
| cisco | aironet_ap1130ag | * | |
| cisco | aironet_ap1131 | * | |
| cisco | aironet_ap1200 | * | |
| cisco | aironet_ap1230ag | * | |
| cisco | aironet_ap1240 | * | |
| cisco | aironet_ap1240ag | * | |
| cisco | aironet_ap1300 | * | |
| cisco | aironet_ap1400 | * | |
| cisco | aironet_ap340 | * | |
| cisco | aironet_ap340 | 11.21 | |
| cisco | aironet_ap350 | * | |
| cisco | aironet_ap350 | 11.21 | |
| cisco | aironet_bridge_350 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6C2928F8-6C6B-4C3F-BBE7-EAE8A0C47E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC51475-7819-4C46-AF3C-251520C3EEFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5538B7E-6AB4-4DB5-920F-EC2BA61DF73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk:*:*:*:*:*:*:*",
"matchCriteriaId": "C8011951-B642-4706-8936-74DCB59304C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*",
"matchCriteriaId": "042B6178-F186-40F3-A1AB-51AEAFCB7244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "19940BFF-0888-4717-AC5F-87A85BE165A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)t8:*:*:*:*:*:*:*",
"matchCriteriaId": "35C4D3D1-5E63-4A1E-BF9B-588FFE5790B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa4:*:*:*:*:*:*:*",
"matchCriteriaId": "D94D6CD6-3AF5-4CC6-991D-3D8C229A1C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa5:*:*:*:*:*:*:*",
"matchCriteriaId": "60704633-BFAB-486F-A613-A806733E9AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E5A2A58-D7B2-4018-BAAE-D6CB49A3A709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C268494-F83A-488D-AEE6-AF7D319B6F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc3:*:*:*:*:*:*:*",
"matchCriteriaId": "484207D7-0AC2-48B6-B86F-182651B6BBB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc4:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC53452-31E6-4C9D-88DF-4AD17609DBFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe3:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF6C6D9-A2BD-469E-AA75-18C063A435D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE48276-21BF-4275-8512-4C5401423064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "40DD5508-B8BF-435C-B316-42FEDDDBA859",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "114B5329-6A76-4BE9-AA57-3463D614D495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CDC06EA9-D4D9-42EE-8A98-598356707894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)eo1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF2F9E9-AA00-4A78-A32C-14CAA1C171A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja:*:*:*:*:*:*:*",
"matchCriteriaId": "2DEA47B2-B51E-4C9C-A9C7-DFC680B32986",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2530834-81C3-4524-A4F0-B4F77DBAEB65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "68BCC003-3F88-4369-A387-6B8D0FDFBE32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD45AA0-EEE1-43FF-B04D-4063769D71AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "7873D1DB-80D0-4076-8716-7618D7161EE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF292613-B9BC-4CF1-A6FA-4AFC077D8632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "208EF5CB-8131-443A-928B-391104DC1C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)t8:*:*:*:*:*:*:*",
"matchCriteriaId": "3115134B-46F9-40F0-9ABD-3F35EE635EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11a:*:*:*:*:*:*:*",
"matchCriteriaId": "0B810AFB-3555-4882-B12B-9DA52AD37AC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*",
"matchCriteriaId": "23B1AF9D-106A-43CB-972C-5E85ADFC355D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*",
"matchCriteriaId": "25C6BBA6-8D45-4BA7-B88E-44D9ECE88009",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D460AE-3B86-4178-A9D4-172AD4AF1DF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xe4:*:*:*:*:*:*:*",
"matchCriteriaId": "552EB570-BFD6-4BBE-805B-41A9A5AE35B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DFEF95-E48F-4586-9D70-89C192FD21E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg2:*:*:*:*:*:*:*",
"matchCriteriaId": "77E1EA17-0717-4715-9F2E-48264E18885B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg4:*:*:*:*:*:*:*",
"matchCriteriaId": "DACA1E35-3681-4E2C-BAB2-DAD99F24F8DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg5:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB85916-14A8-4D16-8BE0-D99B8E5B020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xh:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC5ED4F-1905-4EAA-8AFF-BC50B879725C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk:*:*:*:*:*:*:*",
"matchCriteriaId": "F672CDF2-ACC2-485E-89C6-42E47974C8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*",
"matchCriteriaId": "09C47064-BDD5-4EE7-BAB1-E8FE21EB7DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*",
"matchCriteriaId": "AC204B9A-1C01-4900-B515-5796B0B06E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk4:*:*:*:*:*:*:*",
"matchCriteriaId": "79A06F5D-ADA4-44C6-84EA-7229428B7AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq:*:*:*:*:*:*:*",
"matchCriteriaId": "67151B56-DD5F-4384-9651-FA927CE73D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq1:*:*:*:*:*:*:*",
"matchCriteriaId": "111C62A4-9DF0-4317-9F95-0112BE24D727",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CF0189B-964F-46EC-BE5F-8076CFE7AB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5\\)b1:*:*:*:*:*:*:*",
"matchCriteriaId": "691E3441-AF70-4959-BBA0-60F5328F8FF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "53430E70-FBAD-42F7-8614-7AB04E566810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*",
"matchCriteriaId": "B670057C-7A86-4F61-8FF5-88E6BFE2B5F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FC9F410-782A-416C-9E10-AF43D5BD44FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*",
"matchCriteriaId": "27107AB2-87AB-4909-9F6D-352BA94F8032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4403BFFB-8A89-4512-8030-5DEDC0C0FF93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DE38549C-107E-4350-90F2-BA928E3872AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7601422B-1C22-44D2-A398-1586814A9F7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(5f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "40B9FEE8-FFBB-46E6-A1EA-A243A0073853",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2D9B4FE3-7A03-430F-AE68-743559D74DEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6F5C4FD2-E4BC-447D-8B3B-0248BFBE9121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(6d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BBFB86-2745-4817-9516-50CB08AAA82D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(6e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6F645CEE-083C-412E-BCEF-2761AC266CD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(6f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B5CCD5B9-0771-47B3-A280-6566A489A5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*",
"matchCriteriaId": "56529125-65D8-4900-A741-0AE18852B7A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF14EE4-1D49-4E1B-9589-2F3A8BF3E3E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx:*:*:*:*:*:*:*",
"matchCriteriaId": "3029C050-D02D-4DA3-B8B9-901F808BBDD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "1BEADF66-3434-41E0-9527-4D97F1836A76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C82EB5-8397-4C0D-8074-7B55D83708B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*",
"matchCriteriaId": "E6735142-065C-4AA2-B78A-FCD7CA8CB50F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*",
"matchCriteriaId": "337C0195-34F6-4683-A944-2F698A677476",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t10:*:*:*:*:*:*:*",
"matchCriteriaId": "75901574-5BDD-4388-96F9-A2B4E9970F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)t12:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBCC011-54AB-4E8E-BC20-68E6F274D323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD0A3B5B-4E6B-437A-B355-D9DCDF078201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi4:*:*:*:*:*:*:*",
"matchCriteriaId": "689D066C-972F-4868-A6A3-2F5522489D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*",
"matchCriteriaId": "63CA13FE-93EF-414A-A8D5-333D4A5B9320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr3:*:*:*:*:*:*:*",
"matchCriteriaId": "B19F9376-BE29-4F08-B86F-E1634FF750F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr4:*:*:*:*:*:*:*",
"matchCriteriaId": "68DC1732-CED8-4FA6-9A75-000BABBEA5C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr6:*:*:*:*:*:*:*",
"matchCriteriaId": "570AF3F9-D3F5-44B1-82A1-3C7966A27BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(7.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5719F49C-0BCC-40F9-825A-4C3C9D4D2239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja:*:*:*:*:*:*:*",
"matchCriteriaId": "4701FFB8-6361-4B0F-B413-2649A6FC650E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*",
"matchCriteriaId": "80CC4D9F-F7C1-4887-BDC6-62F4BDFE5079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "21932884-D10B-4C2D-99C5-ED4DE3DA38E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t7:*:*:*:*:*:*:*",
"matchCriteriaId": "AC4C56D7-435E-4AE3-BAE8-96A6EAB57488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t8:*:*:*:*:*:*:*",
"matchCriteriaId": "C44A3B72-EFF5-460D-8EE0-13782AAFDB20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*",
"matchCriteriaId": "378FFEBE-3815-4293-943E-86771AB6D63D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB99DAF-0BF1-43FE-8263-AF8F5EEA7D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xu2:*:*:*:*:*:*:*",
"matchCriteriaId": "B78D2BD4-CD3F-40D2-8F0F-FC765A9B1ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy4:*:*:*:*:*:*:*",
"matchCriteriaId": "A66A1B2C-D653-4275-ADC5-6298A70C939D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*",
"matchCriteriaId": "76DFDE5D-231C-4B79-85CF-2B2097E12437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy6:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6F2B19-7FF1-45E7-91B6-A427343099DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)ya1:*:*:*:*:*:*:*",
"matchCriteriaId": "64F0AD5B-4C2D-4C9D-8207-0A67F9AF995A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yd:*:*:*:*:*:*:*",
"matchCriteriaId": "B91192EA-0320-43D1-8D73-FAD57CC18259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yf:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC57A97-0A3C-466F-AA15-5D97AC528503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*",
"matchCriteriaId": "581D9245-944E-4464-924B-6CB1E874FFEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE205377-1B09-4498-8538-F2B7DF91E579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg2:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBBB1FA-5FA9-4042-AE12-F39307C27F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg3:*:*:*:*:*:*:*",
"matchCriteriaId": "8108DEF0-102A-452B-9B94-D5AAA3918322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yh:*:*:*:*:*:*:*",
"matchCriteriaId": "B4666469-0A0F-4D28-8A1E-39D82ED210CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi:*:*:*:*:*:*:*",
"matchCriteriaId": "61130D36-B1EF-41F1-AF14-57475BE25FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD8A9BF-F084-447C-B28C-2736E8C3A83D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi3:*:*:*:*:*:*:*",
"matchCriteriaId": "A515A997-5922-4C07-9C68-0D071E811F2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21837255-F23B-488A-A9FB-ED984020147D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc:*:*:*:*:*:*:*",
"matchCriteriaId": "51F92965-6498-40EC-8AF7-D31466F973A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*",
"matchCriteriaId": "9417A9B3-CAD8-4E69-9871-484DED263683",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc6:*:*:*:*:*:*:*",
"matchCriteriaId": "39601936-034D-4F48-9F02-0F0E251E34F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc7:*:*:*:*:*:*:*",
"matchCriteriaId": "F3761893-292D-41E8-9800-C888B235E6F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57EE4026-2A06-4E63-924C-43E663EA47DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(9e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DAF8B6B9-3023-4C33-AFB1-C8C4E1504178",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "697C9EFC-7B70-438F-A418-AEFA22841655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(10c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FF6B0F5-0E61-4ECC-B329-80ABCAED3057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19F6275E-146F-4B70-B14C-D857DDA13819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(10e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F590204-33CC-4A6A-9C37-380ADC15813A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EDCFFDE0-284E-4107-98DA-C30724E4BF82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4F50FF-2A42-4BE6-84D8-C6C2A5938125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "B48ACEA8-6E12-40CF-868B-DE343BEBFE41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t5:*:*:*:*:*:*:*",
"matchCriteriaId": "71775098-8BA1-442F-9709-0BCE255DD773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t6:*:*:*:*:*:*:*",
"matchCriteriaId": "8355DB7C-2E2C-4108-BD0F-361B0B898D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*",
"matchCriteriaId": "D80E065F-ABB5-4824-9C59-A53690B0CD1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A4E3DC5-0F83-42DE-9482-92DB413DCDE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*",
"matchCriteriaId": "C63FEE13-5E2A-4011-B720-63EFAFF55049",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl3:*:*:*:*:*:*:*",
"matchCriteriaId": "81FACB05-B13D-494E-8AA3-5590391E6F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf:*:*:*:*:*:*:*",
"matchCriteriaId": "84E27655-2889-4B2A-9C48-ADD48ED5B365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*",
"matchCriteriaId": "7F58FC83-C321-4A9F-8EE2-1531B73E064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7D8166-6522-437F-AEDE-2AC02913FC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf4:*:*:*:*:*:*:*",
"matchCriteriaId": "B805F909-5650-4884-9990-F3776DF203AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yj:*:*:*:*:*:*:*",
"matchCriteriaId": "C705B7F5-2BE4-45F9-8B5F-9FAC900FF6D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk:*:*:*:*:*:*:*",
"matchCriteriaId": "F5610D63-0E50-4AB3-A6F7-36BCF7F69EF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk1:*:*:*:*:*:*:*",
"matchCriteriaId": "17F5092A-473E-4356-9EFB-9E3EBFCD5F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF310185-68F5-48BB-8E11-E38E1961B380",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*",
"matchCriteriaId": "19E24302-D04B-45D1-AC6A-0CE45F9B9F71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yn:*:*:*:*:*:*:*",
"matchCriteriaId": "723B58EA-9686-425C-99DD-FBECDF6E2225",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yr:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EA745A-8AFE-4461-AB53-1FC71E080BC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys:*:*:*:*:*:*:*",
"matchCriteriaId": "E109B3D5-90BB-45B6-8265-B32465AC85E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys1:*:*:*:*:*:*:*",
"matchCriteriaId": "C441F423-86ED-49DF-8BFC-3CA988C9177A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(11\\)yw:*:*:*:*:*:*:*",
"matchCriteriaId": "68D39082-D9B4-4AD2-BA93-D688E098F037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4F0BFAB-D26C-4D17-B5AB-647780423E8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(12b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E59A3B6E-59F6-47B1-BC28-C0B171F1E1F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(12e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B3FBFC2-0628-4A56-A96C-904807E85B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B69920A-6775-4D3B-81A8-F971875C43D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4093FE1B-3B95-4F25-AAF5-329FEBE0F0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc:*:*:*:*:*:*:*",
"matchCriteriaId": "B9411EF8-54EF-49CB-BA09-3AE1133D3146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc1:*:*:*:*:*:*:*",
"matchCriteriaId": "71AA815E-CD4A-44D5-A772-93CB340E7998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(13b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31AB99B6-84C5-426A-A037-5022FD00E6C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "D32302AE-54E2-423A-A418-6C7EAE2CDF0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F616AE0-42B4-403B-B610-99DE15EE490D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*",
"matchCriteriaId": "68A83281-667D-4D1A-9F76-CFF3E5AD560F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*",
"matchCriteriaId": "40FD8309-111A-45BC-819A-99FE9E002ACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*",
"matchCriteriaId": "42C7F308-DB1C-4500-81E4-9E3325D58A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD9C9A9-9B90-479A-9D2D-8681056892AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq3:*:*:*:*:*:*:*",
"matchCriteriaId": "19661048-2B60-437E-9D56-9189BFC4C8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF870144-DFCD-4ADC-A695-3DF9266890EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt:*:*:*:*:*:*:*",
"matchCriteriaId": "D389A57A-005E-40B1-8DFC-3347F67F19F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7CEBAF-65BB-4A89-8C3B-CEF1052D99E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu:*:*:*:*:*:*:*",
"matchCriteriaId": "3B311DEA-F602-49DA-8208-353D2D33283F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*",
"matchCriteriaId": "A14407B6-FEC1-4FD8-8359-CA3EC5477B13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CD190476-DC7A-4033-9149-062D75704AD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(15b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C4510B95-F9F7-4407-B00F-F91B352C99C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E236CDE4-3369-4CDF-B0F0-4888610CCFC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
"matchCriteriaId": "40183EF8-BD19-49AD-9E55-7FCCA635327F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E40D5D-F46E-4098-A46A-1A52A343310D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*",
"matchCriteriaId": "550709E5-9302-4FCB-A969-2DA54BCB2184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
"matchCriteriaId": "D73E5138-016A-48EC-A367-3D3285AAFED2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
"matchCriteriaId": "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
"matchCriteriaId": "9CD5C082-9730-466D-A4A8-E4EEE5F3730D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF419BD-8474-4F33-9CDD-587E341ABA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jed:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA9DE9B-EE39-41E4-A4CF-C9088CFE14AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
"matchCriteriaId": "332B0446-4D8B-414B-B572-84B45D5643AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*",
"matchCriteriaId": "BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*",
"matchCriteriaId": "D40FB896-E20C-46B1-BF59-FBB42295F9C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
"matchCriteriaId": "841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*",
"matchCriteriaId": "B418CFDD-AF36-46F9-B347-B34E72100F95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
"matchCriteriaId": "84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
"matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E3044F-3CE8-4970-9A7F-FDF555F622A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
"matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
"matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*",
"matchCriteriaId": "AB57AAA9-4715-468F-A734-A12209A6069F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*",
"matchCriteriaId": "480D480A-80A3-4113-A1A6-194A8DD47F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
"matchCriteriaId": "98FE195E-084B-4F4C-800D-850165DED48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*",
"matchCriteriaId": "1A310F30-F94D-4A70-94BD-6B94D7B5F5B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
"matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*",
"matchCriteriaId": "72732395-1B82-4E4F-9D63-D1CA0C6BD929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
"matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
"matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
"matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
"matchCriteriaId": "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*",
"matchCriteriaId": "56032FBD-FEE7-4B38-B35E-CD277B931DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*",
"matchCriteriaId": "75CF930C-6871-4BCB-8605-B71F82455123",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
"matchCriteriaId": "520304A4-EB15-42A8-A402-8251A4D2076D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*",
"matchCriteriaId": "F80A9B6F-A5D8-403C-9018-0E627FBC9A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
"matchCriteriaId": "139B1182-61A3-4F3D-9E29-758F27917646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC3706F-B00A-405E-917E-7FD5217E0501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
"matchCriteriaId": "1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2BCA9F-5D56-4EF4-8675-7B76129B994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
"matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*",
"matchCriteriaId": "09698AAF-F4D1-41EE-A960-38FAB645B5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*",
"matchCriteriaId": "1B75FC35-2B4D-4CEE-BE71-D497DF787123",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*",
"matchCriteriaId": "F8711A47-ABD5-40ED-847A-8D1663E3D819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
"matchCriteriaId": "1938D118-C07F-4BEC-8030-947F099BFCB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*",
"matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "65B65738-134F-4C1A-916B-D6CD6365CB43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5331586-8380-4F77-8735-17EC0D0E503A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*",
"matchCriteriaId": "35536E91-A58D-40F7-A256-34128E64B920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "0F69329B-4D37-428E-B467-E3B9314A4D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "9615B275-5748-46CC-8A77-4A9550A39050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "421CD923-6282-4404-A642-C04E1F57F12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4411CB-5EE9-455C-AE90-1770320EFD86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "593D1680-4883-43FE-A925-B87ED1D2E785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*",
"matchCriteriaId": "FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*",
"matchCriteriaId": "EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*",
"matchCriteriaId": "90769378-BBD1-48D0-921C-A79413B99CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6C6DF704-8CC8-42C3-83F1-4D38734DEAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "E636DC68-59FE-4BA0-BCFC-4DA97EE17B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7E0D6801-E9A8-416B-830B-7682A9AF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "23265E4D-855C-4CCC-A875-DFCBA55B3CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB86291-EB40-4CFD-A424-898EFB3D518B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A10AADAC-4687-4308-8E4F-B7F9549556DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A747987-5218-4C1E-87C4-0675CD4F7A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B6483CB-7838-45F7-AE28-824AD71172A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04759B1E-8B40-460F-B33F-4E6332CFC31D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "08AF3694-9686-444B-8D92-E41D262F74E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "C5595E7D-3CFD-4FF2-A6BE-59645058C54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4235428-5E2E-4BCB-98B7-8844B19C7AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9A1E17AB-F645-4636-9337-3158556E85A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86150D11-94D7-43F9-9D19-33778558255F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC43701-8A3A-42FB-B4F5-566DE59E542E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(11\\)md:*:*:*:*:*:*:*",
"matchCriteriaId": "92AD4889-F6B6-4497-A589-8632A1850965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(15\\)md:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0233F4-AA5D-47C3-934A-4BA793DD4A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md:*:*:*:*:*:*:*",
"matchCriteriaId": "498A43E2-5A03-46C9-B60D-8E7CE79F1705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB30791-A691-42DD-8714-B173242EDBBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(23\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A3B5CC3-A83E-4241-ACE1-0FFEE8A5EFE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md:*:*:*:*:*:*:*",
"matchCriteriaId": "539454C8-EA90-4146-9429-72465CF555FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md1:*:*:*:*:*:*:*",
"matchCriteriaId": "4E44F5F4-D7FE-4B9C-BA65-2365EF7A8092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md2:*:*:*:*:*:*:*",
"matchCriteriaId": "9548BCBF-0E01-41F8-A6BA-D70032340C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md3:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BF1BB8-EAB1-46C9-BD36-73E502619C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md4:*:*:*:*:*:*:*",
"matchCriteriaId": "34F23388-1B0B-4708-85F4-5A8B7359C1B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F2A946-AD8A-4644-8630-5951B66E4B34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6AD6E5-EBB0-44D8-A63C-EFF7260E4CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*",
"matchCriteriaId": "89B19F2B-1D89-42FC-89A7-737D8109EB1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB2B390-A39F-4082-BBCB-712BDD95886D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
"matchCriteriaId": "5F782741-0F18-4FBC-9D00-AAABB8BC6A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jdc:*:*:*:*:*:*:*",
"matchCriteriaId": "CA60D334-B2F6-4F34-9EE1-C8F45DB3C441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jdd:*:*:*:*:*:*:*",
"matchCriteriaId": "FD178B67-B9E7-4725-B553-E5ACBCE296D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB11851-BCF8-485B-91F9-6A39B2354826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
"matchCriteriaId": "65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
"matchCriteriaId": "3DFE3FC0-79BC-4549-98BA-235A53719F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
"matchCriteriaId": "4691CEAD-47F1-4A97-84A4-72B794D3F714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A28452-000C-4BBB-A34E-1AA63D69925D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*",
"matchCriteriaId": "237F6EDD-AB47-4768-9C75-C0B03E23696B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mdb:*:*:*:*:*:*:*",
"matchCriteriaId": "620B4962-1EA7-478F-AA0A-06DC7ED83B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mra:*:*:*:*:*:*:*",
"matchCriteriaId": "860A1477-49B5-4356-9D83-A1A092233D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mrb:*:*:*:*:*:*:*",
"matchCriteriaId": "B2580FA9-24EA-4A7A-839F-3C6E7FE69ED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1CD80F-E898-41CE-8A86-28C2F48B928A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
"matchCriteriaId": "78260223-50C0-48F8-9A65-AE67489E602C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
"matchCriteriaId": "18E39462-4CEE-4C29-8B60-50E05FCF3E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF16123-CCA0-4ECD-9B8C-AC1534C3F244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7454AF-7610-4CD3-BD2B-95A6C3283811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*",
"matchCriteriaId": "CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
"matchCriteriaId": "AC90BE87-EB54-46F8-A1FD-8F4E553C69F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
"matchCriteriaId": "883FA166-2973-42BA-842D-28FBDBFEAC4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
"matchCriteriaId": "4362045B-7065-4FF9-A977-B3DA7894F831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
"matchCriteriaId": "BC27E79D-6B4B-4839-9664-DFE821C45C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*",
"matchCriteriaId": "4963A243-74FA-43AD-9645-C9FAD527A6E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*",
"matchCriteriaId": "31C6EACA-35BE-4032-93DA-5F738AEE0F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*",
"matchCriteriaId": "E67621EA-25D8-47C2-ADEA-512E38F2FFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*",
"matchCriteriaId": "94E1421B-2B86-41B2-9288-59780E081337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*",
"matchCriteriaId": "51A5F5FF-6BC4-4A1E-B9F1-BD47096D30B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*",
"matchCriteriaId": "6D910556-9518-45C5-9891-1541760B0920",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7361553C-439A-4EFC-B47C-5D099132A9BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42E54595-DEA2-4CDA-B218-89B034EB129F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "900C8376-9891-4CAF-8873-1CE78CFEB050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D385DFB0-FE3D-4217-B17A-1AB4A34363AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*",
"matchCriteriaId": "903A79E0-184A-4CFB-96FA-A3E0474503FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA740581-ED86-4822-9516-BCCA4C267561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AAA8DE4-4E1D-4286-846D-0381BF68632F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8F1355-5A18-4692-B54C-083291E751E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*",
"matchCriteriaId": "97943532-2C6A-4867-BD40-1B848BD2009A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_bridge_350:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF85A77B-4BFA-427B-A6AC-33BD44DFA06A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426."
},
{
"lang": "es",
"value": "Cisco IOS v12.3 y v12.4 en puntos de acceso Aironet permite a atacantes remotos provocar una denegaci\u00f3n de servicio (radio-interface input-queue hang) a trav\u00e9s de IAPP 0x3281 paquetes, tambi\u00e9n conocido como Bug ID CSCtc12426."
}
],
"id": "CVE-2012-1350",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-06T18:55:00.977",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-2976
Vulnerability from fkie_nvd - Published: 2009-08-27 17:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | aironet_ap1100 | * | |
| cisco | aironet_ap1200 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network."
},
{
"lang": "es",
"value": "Los dispositivos Cisco Aironet Lightweight Access Point (AP) env\u00edan el contenido de ciertos paquetes de multidifusi\u00f3n en texto plano, lo que permite a atacantes remotos descubrir las direcciones IP y MAC del Wireless LAN Controller as\u00ed como los detalles de configuraci\u00f3n del Punto de Acceso (AP) espiando la red wireless."
}
],
"id": "CVE-2009-2976",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-08-27T17:30:00.360",
"references": [
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1022774"
},
{
"source": "cve@mitre.org",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"source": "cve@mitre.org",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1022774"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-2861
Vulnerability from fkie_nvd - Published: 2009-08-27 17:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | aironet_ap1100 | * | |
| cisco | aironet_ap1200 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664."
},
{
"lang": "es",
"value": "La funcionalidad Over-the-Air Provisioning (OTAP) en dispositivos Cisco Aironet Lightweight Access Point 1100 y 1200 no implementan apropiadamente la asociaci\u00f3n al punto de acceso, lo que permite a los atacantes remoto suplantar un controlador y causar una denegaci\u00f3n de servicio (parada de servicio) a trav\u00e9s de una gesti\u00f3n de paquetes de radio remota (RRM) manipulados, tambi\u00e9n conocidos como \"SkyJack\" o Bug ID CSCtb56664."
}
],
"id": "CVE-2009-2861",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.3,
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 9.2,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-08-27T17:00:01.077",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://securitytracker.com/id?1022774"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"source": "psirt@cisco.com",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"source": "psirt@cisco.com",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/36145"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1022774"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/36145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2419"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-0354
Vulnerability from fkie_nvd - Published: 2006-01-22 20:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | aironet_ap1100 | * | |
| cisco | aironet_ap1130ag | * | |
| cisco | aironet_ap1200 | * | |
| cisco | aironet_ap1230ag | * | |
| cisco | aironet_ap1240ag | * | |
| cisco | aironet_ap1300 | * | |
| cisco | aironet_ap1400 | * | |
| cisco | aironet_ap350 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644."
}
],
"id": "CVE-2006-0354",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.1,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-01-22T20:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18430"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/339"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1015483"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/22375"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/16217"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/339"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1015483"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/22375"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/16217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-1350 (GCVE-0-2012-1350)
Vulnerability from cvelistv5 – Published: 2012-08-06 18:00 – Updated: 2024-09-17 00:35
VLAI?
Summary
Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:37.186Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-06T18:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-1350",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-1350",
"datePublished": "2012-08-06T18:00:00Z",
"dateReserved": "2012-02-27T00:00:00Z",
"dateUpdated": "2024-09-17T00:35:31.835Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2976 (GCVE-0-2009-2976)
Vulnerability from cvelistv5 – Published: 2009-08-27 17:00 – Updated: 2024-09-16 18:49
VLAI?
Summary
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:07:37.396Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-08-27T17:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2976",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf",
"refsource": "MISC",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "1022774",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1022774"
},
{
"name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php",
"refsource": "MISC",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2976",
"datePublished": "2009-08-27T17:00:00Z",
"dateReserved": "2009-08-27T00:00:00Z",
"dateUpdated": "2024-09-16T18:49:52.602Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2861 (GCVE-0-2009-2861)
Vulnerability from cvelistv5 – Published: 2009-08-27 16:31 – Updated: 2024-09-17 03:18
VLAI?
Summary
The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:07:37.167Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "36145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/36145"
},
{
"name": "ADV-2009-2419",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-08-27T16:31:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "36145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/36145"
},
{
"name": "ADV-2009-2419",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-2861",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf",
"refsource": "MISC",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "36145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36145"
},
{
"name": "ADV-2009-2419",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"name": "1022774",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1022774"
},
{
"name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php",
"refsource": "MISC",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-2861",
"datePublished": "2009-08-27T16:31:00Z",
"dateReserved": "2009-08-19T00:00:00Z",
"dateUpdated": "2024-09-17T03:18:20.543Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0354 (GCVE-0-2006-0354)
Vulnerability from cvelistv5 – Published: 2006-01-22 20:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:34:14.475Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "339",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/339"
},
{
"name": "oval:org.mitre.oval:def:5680",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"name": "22375",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22375"
},
{
"name": "ADV-2006-0176",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"name": "18430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18430"
},
{
"name": "20060112 Access Point Memory Exhaustion from ARP Attacks",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"name": "cisco-aironet-arp-dos(24086)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"name": "16217",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16217"
},
{
"name": "1015483",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015483"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "339",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/339"
},
{
"name": "oval:org.mitre.oval:def:5680",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"name": "22375",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22375"
},
{
"name": "ADV-2006-0176",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"name": "18430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18430"
},
{
"name": "20060112 Access Point Memory Exhaustion from ARP Attacks",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"name": "cisco-aironet-arp-dos(24086)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"name": "16217",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16217"
},
{
"name": "1015483",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015483"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0354",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "339",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/339"
},
{
"name": "oval:org.mitre.oval:def:5680",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"name": "22375",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22375"
},
{
"name": "ADV-2006-0176",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"name": "18430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18430"
},
{
"name": "20060112 Access Point Memory Exhaustion from ARP Attacks",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"name": "cisco-aironet-arp-dos(24086)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"name": "16217",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16217"
},
{
"name": "1015483",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015483"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0354",
"datePublished": "2006-01-22T20:00:00",
"dateReserved": "2006-01-22T00:00:00",
"dateUpdated": "2024-08-07T16:34:14.475Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-1350 (GCVE-0-2012-1350)
Vulnerability from nvd – Published: 2012-08-06 18:00 – Updated: 2024-09-17 00:35
VLAI?
Summary
Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:37.186Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-06T18:00:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-1350",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-1350",
"datePublished": "2012-08-06T18:00:00Z",
"dateReserved": "2012-02-27T00:00:00Z",
"dateUpdated": "2024-09-17T00:35:31.835Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2976 (GCVE-0-2009-2976)
Vulnerability from nvd – Published: 2009-08-27 17:00 – Updated: 2024-09-16 18:49
VLAI?
Summary
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:07:37.396Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-08-27T17:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2976",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf",
"refsource": "MISC",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "1022774",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1022774"
},
{
"name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php",
"refsource": "MISC",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2976",
"datePublished": "2009-08-27T17:00:00Z",
"dateReserved": "2009-08-27T00:00:00Z",
"dateUpdated": "2024-09-16T18:49:52.602Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-2861 (GCVE-0-2009-2861)
Vulnerability from nvd – Published: 2009-08-27 16:31 – Updated: 2024-09-17 03:18
VLAI?
Summary
The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:07:37.167Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "36145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/36145"
},
{
"name": "ADV-2009-2419",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-08-27T16:31:00Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "36145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/36145"
},
{
"name": "ADV-2009-2419",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"name": "1022774",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1022774"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-2861",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka \"SkyJack\" or Bug ID CSCtb56664."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf",
"refsource": "MISC",
"url": "http://www.airmagnet.com/assets/AM_Technote_SkyJack_082509.pdf"
},
{
"name": "36145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36145"
},
{
"name": "ADV-2009-2419",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2419"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=18919"
},
{
"name": "1022774",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1022774"
},
{
"name": "http://www.airmagnet.com/news/press_releases/2009/08252009.php",
"refsource": "MISC",
"url": "http://www.airmagnet.com/news/press_releases/2009/08252009.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2009-2861",
"datePublished": "2009-08-27T16:31:00Z",
"dateReserved": "2009-08-19T00:00:00Z",
"dateUpdated": "2024-09-17T03:18:20.543Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0354 (GCVE-0-2006-0354)
Vulnerability from nvd – Published: 2006-01-22 20:00 – Updated: 2024-08-07 16:34
VLAI?
Summary
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:34:14.475Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "339",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/339"
},
{
"name": "oval:org.mitre.oval:def:5680",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"name": "22375",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/22375"
},
{
"name": "ADV-2006-0176",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"name": "18430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18430"
},
{
"name": "20060112 Access Point Memory Exhaustion from ARP Attacks",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"name": "cisco-aironet-arp-dos(24086)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"name": "16217",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16217"
},
{
"name": "1015483",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1015483"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-01-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "339",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/339"
},
{
"name": "oval:org.mitre.oval:def:5680",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"name": "22375",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/22375"
},
{
"name": "ADV-2006-0176",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"name": "18430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18430"
},
{
"name": "20060112 Access Point Memory Exhaustion from ARP Attacks",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"name": "cisco-aironet-arp-dos(24086)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"name": "16217",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16217"
},
{
"name": "1015483",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1015483"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0354",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "339",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/339"
},
{
"name": "oval:org.mitre.oval:def:5680",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5680"
},
{
"name": "22375",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22375"
},
{
"name": "ADV-2006-0176",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0176"
},
{
"name": "18430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18430"
},
{
"name": "20060112 Access Point Memory Exhaustion from ARP Attacks",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml"
},
{
"name": "cisco-aironet-arp-dos(24086)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24086"
},
{
"name": "16217",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16217"
},
{
"name": "1015483",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015483"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0354",
"datePublished": "2006-01-22T20:00:00",
"dateReserved": "2006-01-22T00:00:00",
"dateUpdated": "2024-08-07T16:34:14.475Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}