Search criteria
42 vulnerabilities found for catalyst_7600 by cisco
FKIE_CVE-2012-5037
Vulnerability from fkie_nvd - Published: 2014-04-23 11:52 - Updated: 2025-04-12 10:46
Severity ?
Summary
The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a "no object-group" command followed by an object-group command, aka Bug ID CSCts16133.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | * | |
| cisco | catalyst_6500 | * | |
| cisco | catalyst_7600 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E07D29-3488-450B-9704-876ADB6A6622",
"versionEndIncluding": "15.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a \"no object-group\" command followed by an object-group command, aka Bug ID CSCts16133."
},
{
"lang": "es",
"value": "La implementaci\u00f3n ACL en Cisco IOS anterior a 15.1(1)SY en dispositivos Catalyst 6500 y 7600 permite a usuarios locales causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de un comando \"no object-group\" seguido por un comando object-group, tambi\u00e9n conocido como Bug ID CSCts16133."
}
],
"id": "CVE-2012-5037",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-04-23T11:52:59.180",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3296
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875."
},
{
"lang": "es",
"value": "Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 antes de v3.1(21), v3.2 antes de v3.2(22), v4.0 antes de v4.0(16), y v4.1 antes de v4.1(7), cuando se utiliza IPv6, permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda o bloqueo del m\u00f3dulo) a trav\u00e9s de vectores que desencadenan un mensaje de syslog 302015. Se trata de un problema tambi\u00e9n conocido como Bug ID CSCti83875."
}
],
"id": "CVE-2011-3296",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.143",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3302
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989."
},
{
"lang": "es",
"value": "Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el m\u00f3dulo de ASA en dispositivos de la serie Cisco Catalyst 6500, con el software v7.0 anteriores a v7.0(8.13), v7.1 y v7.2 anteriores a v7.2(5.4), v8.0 anteriores a v8.0(5.25), v8.1 y v8.2 anteriores a v8.2(5.11), v8.3 anteriores a v8.3(2.23), v8.4 anteriores a v8.4(2.6), y v8.5 anteriores a v8.5(1.1) y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anteriores a v3.1(21), v3.2 anteriores a v3.2(22), v4.0 anteriores a v4.0(16), y v4.1 anteriores a v4.1(7) permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s del tr\u00e1fico SunRPC manipulado, tambi\u00e9n conocido como Bug IDs CSCto92398 y CSCtq09989."
}
],
"id": "CVE-2011-3302",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.550",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/76089"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/76089"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3303
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802."
},
{
"lang": "es",
"value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500, y el m\u00f3dulo ASA Services en dispositivos Cisco Catalyst 6500, con software v7.0 anteriores a v7.0(8.13), v7.1 y v7.2 anteriores a v7.2(5.4), v8.0 anteriores a v8.0(5.25), v8.1 anteriores a v8.1(2.50), v8.2 anteriores a v8.2(5.6), v8.3 anteriores a v8.3(2.23), v8.4 anteriores a v8.4(2.7), y v8.5 anteriores a v8.5(1.1) y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anteriores a v3.1(21), v3.2 anteriores a v3.2(22), v4.0 anteriores a v4.0(16), y v4.1 anteriores a v4.1(7) permite a atacantes remotos a provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de tr\u00e1fico ILS manipulado, tambi\u00e9n conocido como Bug IDs CSCtq57697 y CSCtq57802."
}
],
"id": "CVE-2011-3303",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.597",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/76090"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/76090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3298
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274."
},
{
"lang": "es",
"value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de los dispositivos Cisco Catalyst 6500 series, con software 7.0 anterior a 7.0(8.13), 7.1 y 7.2 anterior a 7.2(5.3), 8.0 anterior a 8.0(5.24), 8.1 anterior a 8.1(2.50), 8.2 anterior a 8.2(5), 8.3 anterior a 8.3(2.18), 8.4 anterior a 8.4(1.10), y 8.5 anterior a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anterior a 3.1(21), 3.2 anterior a 3.2(22), 4.0 anterior a 4.0(16), y 4.1 anterior a 4.1(7) permiten a atacantes remotos evitar la autenticaci\u00f3n a trav\u00e9s de respuestas TACACS+ modificadas. Tambi\u00e9n conocido como Bug IDs CSCto40365 y CSCto74274."
}
],
"id": "CVE-2011-3298",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.333",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3301
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986."
},
{
"lang": "es",
"value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de Cisco Catalyst 6500 series, con software 7.0 anteriores a 7.0(8.13), 7.1 y 7.2 anteriores a 7.2(5.4), 8.0 anteriores a 8.0(5.25), 8.1 y 8.2 anteriores a 8.2(5.11), 8.3 anteriores a 8.3(2.23), 8.4 anteriores a 8.4(2.6), y 8.5 anteriores a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de tr\u00e1fico SunRPC modificado. Tambi\u00e9n conocido como Bug IDs CSCtq06062 y CSCtq09986."
}
],
"id": "CVE-2011-3301",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.487",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/76088"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/76088"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3297
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697."
},
{
"lang": "es",
"value": "Cisco Firewall Services Module (FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7), si determinadas configuraciones de autenticaci\u00f3n son usadas, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del m\u00f3dulo) haciendo muchas peticiones de autenticaci\u00f3n para el acceso a red. Tambi\u00e9n conocido como Bug ID CSCtn15697."
}
],
"id": "CVE-2011-3297",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.300",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3299
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972."
},
{
"lang": "es",
"value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de Cisco Catalyst 6500 series, con software 7.0 anteriores a 7.0(8.13), 7.1 y 7.2 anteriores a 7.2(5.4), 8.0 anteriores a 8.0(5.25), 8.1 y 8.2 anteriores a 8.2(5.11), 8.3 anteriores a 8.3(2.23), 8.4 anteriores a 8.4(2.6), y 8.5 anteriores a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de tr\u00e1fico SunRPC modificado. Tambi\u00e9n conocido como Bug IDs CSCto92380 and CSCtq09972."
}
],
"id": "CVE-2011-3299",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.393",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3304
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486."
},
{
"lang": "es",
"value": "Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el m\u00f3dulo de ASA en dispositivos de la serie Cisco Catalyst 6500, con el software v7.2 anterior a v7.2(5.3), v8.0 antereior a v8.0(5.25), v8.1 anterior a v8.1(2.50), v8.2 anterior a v8.2(5.11), v8.3 anterior a v8.3(2.23), v8.4 anterior a v8.4(2), y v8.5 anterior a v8.5(1.1) permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s del tr\u00e1fico MSN Instant Messenger manipulado, tambi\u00e9n conocido como Bug ID CSCtl67486."
}
],
"id": "CVE-2011-3304",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.643",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/76091"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/49952"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/76091"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/49952"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-3300
Vulnerability from fkie_nvd - Published: 2011-10-06 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*",
"matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978."
},
{
"lang": "es",
"value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de Cisco Catalyst 6500 series, con software 7.0 anteriores a 7.0(8.13), 7.1 y 7.2 anteriores a 7.2(5.4), 8.0 anteriores a 8.0(5.25), 8.1 y 8.2 anteriores a 8.2(5.11), 8.3 anteriores a 8.3(2.23), 8.4 anteriores a 8.4(2.6), y 8.5 anteriores a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de tr\u00e1fico SunRPC modificado. Tambi\u00e9n conocido como Bug IDs CSCtq06065 and CSCtq09978."
}
],
"id": "CVE-2011-3300",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-10-06T10:55:05.440",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/76087"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/76087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-5037 (GCVE-0-2012-5037)
Vulnerability from cvelistv5 – Published: 2014-04-23 10:00 – Updated: 2024-08-06 20:50
VLAI?
Summary
The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a "no object-group" command followed by an object-group command, aka Bug ID CSCts16133.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.549Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-10-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a \"no object-group\" command followed by an object-group command, aka Bug ID CSCts16133."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-04-23T06:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-5037",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a \"no object-group\" command followed by an object-group command, aka Bug ID CSCts16133."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-5037",
"datePublished": "2014-04-23T10:00:00",
"dateReserved": "2012-09-21T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.549Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3300 (GCVE-0-2011-3300)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.711Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-dos(70331)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"name": "76087",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76087"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-dos(70331)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"name": "76087",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76087"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3300",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-dos(70331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"name": "76087",
"refsource": "OSVDB",
"url": "http://osvdb.org/76087"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3300",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.711Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3302 (GCVE-0-2011-3302)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.764Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "76089",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76089"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-inspection-dos(70333)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "76089",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76089"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-inspection-dos(70333)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3302",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "76089",
"refsource": "OSVDB",
"url": "http://osvdb.org/76089"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-inspection-dos(70333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3302",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.764Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3303 (GCVE-0-2011-3303)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.737Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-ils-dos(70329)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"name": "76090",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76090"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-ils-dos(70329)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"name": "76090",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76090"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-ils-dos(70329)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"name": "76090",
"refsource": "OSVDB",
"url": "http://osvdb.org/76090"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3303",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.737Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3301 (GCVE-0-2011-3301)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "76088",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76088"
},
{
"name": "cisco-sunrpc-inspection-dos(70332)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "76088",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76088"
},
{
"name": "cisco-sunrpc-inspection-dos(70332)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "76088",
"refsource": "OSVDB",
"url": "http://osvdb.org/76088"
},
{
"name": "cisco-sunrpc-inspection-dos(70332)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3301",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.730Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3296 (GCVE-0-2011-3296)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.709Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-syslog-dos(70326)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-syslog-dos(70326)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3296",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-syslog-dos(70326)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3296",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.709Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3299 (GCVE-0-2011-3299)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.719Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sunrpc-inspection-engine-dos(70330)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sunrpc-inspection-engine-dos(70330)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3299",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-sunrpc-inspection-engine-dos(70330)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3299",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.719Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3298 (GCVE-0-2011-3298)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-tacacs-security-bypass(70328)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-tacacs-security-bypass(70328)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3298",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-tacacs-security-bypass(70328)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3298",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3297 (GCVE-0-2011-3297)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-proxy-dos(70327)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-proxy-dos(70327)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3297",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-proxy-dos(70327)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3297",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.723Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3304 (GCVE-0-2011-3304)
Vulnerability from cvelistv5 – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.692Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-asa-msnim-dos(70334)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"name": "49952",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/49952"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "76091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76091"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-asa-msnim-dos(70334)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"name": "49952",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/49952"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "76091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76091"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-asa-msnim-dos(70334)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"name": "49952",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49952"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "76091",
"refsource": "OSVDB",
"url": "http://osvdb.org/76091"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3304",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.692Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-5037 (GCVE-0-2012-5037)
Vulnerability from nvd – Published: 2014-04-23 10:00 – Updated: 2024-08-06 20:50
VLAI?
Summary
The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a "no object-group" command followed by an object-group command, aka Bug ID CSCts16133.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.549Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-10-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a \"no object-group\" command followed by an object-group command, aka Bug ID CSCts16133."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-04-23T06:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-5037",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ACL implementation in Cisco IOS before 15.1(1)SY on Catalyst 6500 and 7600 devices allows local users to cause a denial of service (device reload) via a \"no object-group\" command followed by an object-group command, aka Bug ID CSCts16133."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf",
"refsource": "CONFIRM",
"url": "http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2012-5037",
"datePublished": "2014-04-23T10:00:00",
"dateReserved": "2012-09-21T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.549Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3300 (GCVE-0-2011-3300)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.711Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-dos(70331)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"name": "76087",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76087"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-dos(70331)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"name": "76087",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76087"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3300",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-dos(70331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331"
},
{
"name": "76087",
"refsource": "OSVDB",
"url": "http://osvdb.org/76087"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3300",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.711Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3302 (GCVE-0-2011-3302)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.764Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "76089",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76089"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-inspection-dos(70333)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "76089",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76089"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-inspection-dos(70333)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3302",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "76089",
"refsource": "OSVDB",
"url": "http://osvdb.org/76089"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "cisco-fwsm-sunrpc-inspection-dos(70333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3302",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.764Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3303 (GCVE-0-2011-3303)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.737Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-ils-dos(70329)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"name": "76090",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76090"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-ils-dos(70329)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"name": "76090",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76090"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-ils-dos(70329)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
},
{
"name": "76090",
"refsource": "OSVDB",
"url": "http://osvdb.org/76090"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3303",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.737Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3301 (GCVE-0-2011-3301)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "76088",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76088"
},
{
"name": "cisco-sunrpc-inspection-dos(70332)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "76088",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76088"
},
{
"name": "cisco-sunrpc-inspection-dos(70332)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "76088",
"refsource": "OSVDB",
"url": "http://osvdb.org/76088"
},
{
"name": "cisco-sunrpc-inspection-dos(70332)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3301",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.730Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3296 (GCVE-0-2011-3296)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.709Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-syslog-dos(70326)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-syslog-dos(70326)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3296",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-syslog-dos(70326)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3296",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.709Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3299 (GCVE-0-2011-3299)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.719Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sunrpc-inspection-engine-dos(70330)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sunrpc-inspection-engine-dos(70330)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3299",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-sunrpc-inspection-engine-dos(70330)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3299",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.719Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3298 (GCVE-0-2011-3298)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-tacacs-security-bypass(70328)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-tacacs-security-bypass(70328)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3298",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-tacacs-security-bypass(70328)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3298",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3297 (GCVE-0-2011-3297)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-fwsm-proxy-dos(70327)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-fwsm-proxy-dos(70327)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3297",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-fwsm-proxy-dos(70327)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3297",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.723Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-3304 (GCVE-0-2011-3304)
Vulnerability from nvd – Published: 2011-10-06 10:00 – Updated: 2024-08-06 23:29
VLAI?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:29:56.692Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-asa-msnim-dos(70334)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"name": "49952",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/49952"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "76091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/76091"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-10-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-asa-msnim-dos(70334)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"name": "49952",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/49952"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "76091",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/76091"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-3304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.2 before 7.2(5.3), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2), and 8.5 before 8.5(1.1) allow remote attackers to cause a denial of service (device reload) via crafted MSN Instant Messenger traffic, aka Bug ID CSCtl67486."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-asa-msnim-dos(70334)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70334"
},
{
"name": "49952",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49952"
},
{
"name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml"
},
{
"name": "76091",
"refsource": "OSVDB",
"url": "http://osvdb.org/76091"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-3304",
"datePublished": "2011-10-06T10:00:00",
"dateReserved": "2011-08-29T00:00:00",
"dateUpdated": "2024-08-06T23:29:56.692Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}