Vulnerabilites related to cisco - catalyst_3750-x
Vulnerability from fkie_nvd
Published
2013-02-13 23:55
Modified
2024-11-21 01:48
Severity ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
Impacted products
Vendor Product Version
cisco ios -
cisco catalyst_2820 *
cisco catalyst_2820 9.0_0.07
cisco catalyst_2900 *
cisco catalyst_2900 lre_xl
cisco catalyst_2900 xl
cisco catalyst_2900_vlan *
cisco catalyst_2900xl *
cisco catalyst_2901 *
cisco catalyst_2902 *
cisco catalyst_2920 *
cisco catalyst_2926 *
cisco catalyst_2926f *
cisco catalyst_2926gl *
cisco catalyst_2926gs *
cisco catalyst_2926t *
cisco catalyst_2940 *
cisco catalyst_2948 *
cisco catalyst_2948-ge-tx *
cisco catalyst_2948g *
cisco catalyst_2948g-l3 *
cisco catalyst_2950 *
cisco catalyst_2950_lre *
cisco catalyst_2955 *
cisco catalyst_2970 *
cisco catalyst_2980g *
cisco catalyst_2980g-a *
cisco catalyst_3000 *
cisco catalyst_3200 *
cisco catalyst_3500 *
cisco catalyst_3500_xl *
cisco catalyst_3500xl *
cisco catalyst_3550 *
cisco catalyst_3560 *
cisco catalyst_3560-e *
cisco catalyst_3560-x *
cisco catalyst_3750 *
cisco catalyst_3750-e *
cisco catalyst_3750-x *
cisco catalyst_3750_metro *
cisco catalyst_3750g *
cisco catalyst_3900 *
cisco catalyst_4000 *
cisco catalyst_4200 *
cisco catalyst_4224 *
cisco catalyst_4232 *
cisco catalyst_4232-13 *
cisco catalyst_4500 *
cisco catalyst_4503 *
cisco catalyst_4506 *
cisco catalyst_4507r *
cisco catalyst_4510r *
cisco catalyst_4840g *
cisco catalyst_4908g-l3 *
cisco catalyst_4912g *
cisco catalyst_4948 *
cisco catalyst_5000 *
cisco catalyst_5500 *
cisco catalyst_5505 *
cisco catalyst_5509 *
cisco catalyst_6000 *
cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6000_ws-x6380-nam 2.1\(2\)
cisco catalyst_6000_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6500 *
cisco catalyst_6500_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6500_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6500_ws-x6380-nam 2.1\(2\)
cisco catalyst_6500_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6503-e -
cisco catalyst_6504-e -
cisco catalyst_6506-e -
cisco catalyst_6509-e -
cisco catalyst_6509-neb-a -
cisco catalyst_6509-v-e -
cisco catalyst_6513 -
cisco catalyst_6513-e -
cisco catalyst_6608 *
cisco catalyst_6624 *
cisco catalyst_7600 *
cisco catalyst_7600_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_7600_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_7600_ws-x6380-nam 2.1\(2\)
cisco catalyst_7600_ws-x6380-nam 3.1\(1a\)
cisco catalyst_8500 *
cisco catalyst_8510csr *
cisco catalyst_8510msr *
cisco catalyst_8540csr *
cisco catalyst_8540msr *
cisco catalyst_ws-c2924-xl *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6230A85-30D2-4934-A8A0-11499B7B09F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65F67-4C3B-42A2-ACD7-4590FF3125E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DBBC2D9-67D3-47FB-A627-7703A5440B34",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85876B6F-DE52-4FC2-85E9-3639B2894A90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38034CB-72FD-4E96-A3E3-0B555EC54A7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C3745E0-4918-40AD-A219-111DC81CF766",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900_vlan:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "643219DD-5795-48F9-899D-19A27A614F90",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900xl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "608C95E6-75D1-4A04-83B4-F9785CD25F79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EAFC2E-8385-4A04-A761-EC54011A333C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88256AC6-6E27-40E6-9714-398DEF763D78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61F8C4A-1B97-4550-A465-3157A51E5D04",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5388120C-0B85-4029-9A6C-EFFD282F23EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B539EED0-16A3-4F4F-8791-F90FDA13520B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8F5796A-1E96-46DE-8B46-B46140D65A07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC79C1CD-FC2D-4667-A92E-8C87ECE04128",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "15CC7BDB-8C89-43AB-A514-8FC23092DE4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CFE777F-AC93-4598-A406-C437BB1FFCE3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1354FE59-7DB1-4CFE-9149-40EA1CE7B000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7C96219-7521-4F11-A222-9BCAB0B9B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD6B51E6-ABEF-4E22-B0D0-692D76784B95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA122273-0B84-4CE6-AAF6-F89E1F986C33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3500xl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9229CAAE-1582-43DE-B727-881D0E3ABB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83227C65-2708-4974-BDCE-07F9849CC921",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "84DD0996-8EF3-4845-8171-3053A4505213",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "838B730D-D40C-4CBA-ABCE-BD4F4478D75F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC517907-C094-4B7F-8073-480DE18CDD75",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04831AE8-B21E-4674-AD14-9E98AF50D250",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8348B895-7B3F-40CB-8843-02DBD28FC6F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E27A63C6-255D-449F-B00B-4EB4060ED7E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E25997-76B2-46FF-8426-8F40002BEE78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23267E55-E098-41F5-9B9A-E1919214B579",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "324DE8A5-FA75-4758-8775-65051504259F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "843C8691-3CB5-4C7E-A6C0-47625387CF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "16867F98-C635-4507-B5A9-BD19181B1E67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83198D7C-C205-44AF-901F-6BD6D5C36244",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8473D554-26FD-4D38-92FC-EE3EE2F3D30A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3645D147-C584-48AD-9FFD-7D7401342555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F131955B-CDE7-48BC-9F64-E56BC90F2695",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75201F-F007-4612-A3F0-ABC75C730F94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0BF0BBC8-04BD-4867-B188-35461E50FF16",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C959C93D-D58C-4AB5-9058-0CF257C68F72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EC58B690-8D30-4A04-82AA-A827F87DEE02",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "41491D13-A3F9-464A-A84B-A58320838CBD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F202892E-2E58-4D77-B983-38AFA51CDBC6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BE25114-ABBC-47A0-9C20-E8D40D721313",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FADD5F49-2817-40EC-861C-C922825708BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E628F9C4-98C6-4A95-AF81-F1E6A56E8648",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFF899C-1EB3-46D8-9003-EA36A68C90B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6463491-F63E-44CB-A1D4-C029BE7D3D3D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8668D34-096B-4FC3-B9B1-0ECFD6265778",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F918F12-DC72-45B0-B776-3F744F12F3D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DD2CF99-7556-427B-BCE5-980BBADC4294",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8D63186-5834-448C-98F2-0C189A11D25D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6353A76-2075-4245-94C5-D23BF9C03732",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "32583745-9640-4032-B1E1-598ABB4E89A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "793FC8D9-A500-4D21-858F-97CE380C3774",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2C0C970-2EB3-489A-AFA5-3066B78D2A32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCA10A45-3421-48A0-82D7-1605641E0AAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.",
      },
      {
         lang: "es",
         value: "El servidor HTTP en Cisco IOS en switches Catalyst no trata correctamente los eventos socket TCP, lo que permite a atacantes remotos provocar una denegación de servicio (caída de dispositivo) a través de paquetes hechos a mano en el puerto TCP (1) 80 o (2) 443, también conocido como Bug ID CSCuc53853.",
      },
   ],
   id: "CVE-2013-1100",
   lastModified: "2024-11-21T01:48:54.600",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 5.4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-02-13T23:55:01.117",
   references: [
      {
         source: "ykramarz@cisco.com",
         url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
      },
   ],
   sourceIdentifier: "ykramarz@cisco.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2013-10-25 03:52
Modified
2024-11-21 01:57
Severity ?
Summary
Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.
Impacted products
Vendor Product Version
cisco ios -
cisco catalyst_3750-x *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6230A85-30D2-4934-A8A0-11499B7B09F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.",
      },
      {
         lang: "es",
         value: "Cisco IOS en el switches Catalyst 3750X tiene por defecto credenciales de Service Module, lo que hace que sea más fácil para los usuarios locales conseguir privilegios a través de un inicio de sesión de un Service Module, también conocido como Bug ID CSCue92286.",
      },
   ],
   id: "CVE-2013-5522",
   lastModified: "2024-11-21T01:57:38.030",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.8,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.1,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-10-25T03:52:54.970",
   references: [
      {
         source: "ykramarz@cisco.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522",
      },
   ],
   sourceIdentifier: "ykramarz@cisco.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-08-06 17:55
Modified
2024-11-21 01:36
Severity ?
Summary
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB41294E-F3DF-4F1E-A4C8-E90B21A88836",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83227C65-2708-4974-BDCE-07F9849CC921",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560-e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "84DD0996-8EF3-4845-8171-3053A4505213",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "838B730D-D40C-4CBA-ABCE-BD4F4478D75F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750-e:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D0458B-2B1B-4DAA-AB5D-BA95DFD058DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750-x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C022076A-05DE-4EAF-9CFE-CF9B99D1D08D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC517907-C094-4B7F-8073-480DE18CDD75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EAB8765-659C-4A1D-ACA8-3323FA64CCEC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.",
      },
      {
         lang: "es",
         value: "Cisco IOS v15.0 y v15.1 en el Catalyst 3560 y 3750 switches de la serie permite a usuarios remotos autenticados provocar una denegación de servicio (recarga del dispositivo) al completar la autenticación web local con rapidez, también conocido como Bug ID CSCts88664.",
      },
   ],
   id: "CVE-2012-1338",
   lastModified: "2024-11-21T01:36:49.953",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-08-06T17:55:00.697",
   references: [
      {
         source: "ykramarz@cisco.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
      },
      {
         source: "ykramarz@cisco.com",
         url: "http://www.securitytracker.com/id?1027349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1027349",
      },
   ],
   sourceIdentifier: "ykramarz@cisco.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2012-1338
Vulnerability from cvelistv5
Published
2012-08-06 17:00
Modified
2024-08-06 18:53
Severity ?
Summary
Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T18:53:37.171Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1027349",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1027349",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-06-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-03-30T09:00:00",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "1027349",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1027349",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@cisco.com",
               ID: "CVE-2012-1338",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco IOS 15.0 and 15.1 on Catalyst 3560 and 3750 series switches allows remote authenticated users to cause a denial of service (device reload) by completing local web authentication quickly, aka Bug ID CSCts88664.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1027349",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1027349",
                  },
                  {
                     name: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
                     refsource: "CONFIRM",
                     url: "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2012-1338",
      datePublished: "2012-08-06T17:00:00",
      dateReserved: "2012-02-27T00:00:00",
      dateUpdated: "2024-08-06T18:53:37.171Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-1100
Vulnerability from cvelistv5
Published
2013-02-13 23:00
Modified
2024-09-16 18:14
Severity ?
Summary
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T14:49:20.711Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-02-13T23:00:00Z",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@cisco.com",
               ID: "CVE-2013-1100",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20130130 Cisco IOS Software HTTP Server Denial of Service Vulnerability",
                     refsource: "CISCO",
                     url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1100",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2013-1100",
      datePublished: "2013-02-13T23:00:00Z",
      dateReserved: "2013-01-11T00:00:00Z",
      dateUpdated: "2024-09-16T18:14:13.971Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-5522
Vulnerability from cvelistv5
Published
2013-10-25 01:00
Modified
2024-09-16 19:36
Severity ?
Summary
Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T17:15:20.869Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20131024 Cisco Catalyst 3750X Default Credentials Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2013-10-25T01:00:00Z",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "20131024 Cisco Catalyst 3750X Default Credentials Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@cisco.com",
               ID: "CVE-2013-5522",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20131024 Cisco Catalyst 3750X Default Credentials Vulnerability",
                     refsource: "CISCO",
                     url: "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5522",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2013-5522",
      datePublished: "2013-10-25T01:00:00Z",
      dateReserved: "2013-08-22T00:00:00Z",
      dateUpdated: "2024-09-16T19:36:51.259Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}