Search criteria
15 vulnerabilities found for catalyst_7600_ws-x6380-nam by cisco
FKIE_CVE-2007-5134
Vulnerability from fkie_nvd - Published: 2007-09-27 19:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | catalyst_6500 | * | |
| cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
| cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
| cisco | catalyst_7600 | * | |
| cisco | catalyst_7600 | * | |
| cisco | catalyst_7600 | * | |
| cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
| cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
| cisco | catos | 5.4\(1\) | |
| cisco | catos | 7.5\(1\) | |
| cisco | catos | 7.6\(1\) |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
"matchCriteriaId": "5367C3D5-583A-4942-828F-DD9C8790C93A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
"matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended."
},
{
"lang": "es",
"value": "Las series de dispositivos Cisco Catalyst 6500 y Cisco 7600 utilizan direcciones IP 127/8 para el Canal Ethernet Fuera de Banda (EOBC, Ethernet Out-of-Band Channel), lo cual permite a atacantes remotos enviar paquetes a una interfaz para la cual la exposici\u00f3n de la red no era intencionada."
}
],
"id": "CVE-2007-5134",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-09-27T19:17:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26988"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1018742"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/25822"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018743"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1018742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/25822"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-1257
Vulnerability from fkie_nvd - Published: 2007-03-03 20:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | network_analysis_module | * | |
| cisco | catalyst_6000_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_6000_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_6000_ws-x6380-nam | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:network_analysis_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD82BCCE-F68A-48A5-B484-98D9C3024E3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM\u0027s own IP address."
},
{
"lang": "es",
"value": "El M\u00f3dulo Network Analysis (NAM) del Cisco Catalyst Series 6000, 6500 y 7600 permite a atacantes remotos ejecutar comandos de su elecci\u00f3n mediante ciertos paquetes SNMP que son simulados desde la propia direcci\u00f3n IP del NAM."
}
],
"evaluatorComment": "Per: http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml#@ID\r\n\r\n\"Only Cisco Catalyst systems that have a NAM on them are affected. This vulnerability affects systems that run Internetwork Operating System (IOS) or Catalyst Operating System (CatOS). \"",
"id": "CVE-2007-1257",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-03-03T20:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33066"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24344"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22751"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017710"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24344"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22751"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017710"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-4258
Vulnerability from fkie_nvd - Published: 2005-12-15 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7426171-91E9-4369-88F8-469D2D70FF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*",
"matchCriteriaId": "2795A59A-0157-4EE3-B8B7-946DB7BEACA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*",
"matchCriteriaId": "AF84505D-5736-46AC-8723-230EEB80870F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA369237-AEDC-42C2-BAFA-4FE370A28E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70F6296A-4C3C-4A88-B1A4-3EB971339F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*",
"matchCriteriaId": "D89FB0BB-64D2-4385-9302-FDCB05F92345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD87934C-057F-4EB3-9B42-2136A69A5AC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23F65F67-4C3B-42A2-ACD7-4590FF3125E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBBC2D9-67D3-47FB-A627-7703A5440B34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85876B6F-DE52-4FC2-85E9-3639B2894A90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
"matchCriteriaId": "E38034CB-72FD-4E96-A3E3-0B555EC54A7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
"matchCriteriaId": "5C3745E0-4918-40AD-A219-111DC81CF766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26EAFC2E-8385-4A04-A761-EC54011A333C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5388120C-0B85-4029-9A6C-EFFD282F23EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC79C1CD-FC2D-4667-A92E-8C87ECE04128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15CC7BDB-8C89-43AB-A514-8FC23092DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFE777F-AC93-4598-A406-C437BB1FFCE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1354FE59-7DB1-4CFE-9149-40EA1CE7B000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C96219-7521-4F11-A222-9BCAB0B9B9D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA122273-0B84-4CE6-AAF6-F89E1F986C33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04831AE8-B21E-4674-AD14-9E98AF50D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*",
"matchCriteriaId": "87DF7111-AC30-4B16-8EF9-C21E0280808F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*",
"matchCriteriaId": "FC9179DB-C0A8-4B9C-BC17-B9EA55C9B731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*",
"matchCriteriaId": "F37FE8BD-1434-4F1D-B207-D5C8E48344AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*",
"matchCriteriaId": "0F51C943-BBD4-4CAD-8F57-FABECDC469E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8348B895-7B3F-40CB-8843-02DBD28FC6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E27A63C6-255D-449F-B00B-4EB4060ED7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*",
"matchCriteriaId": "0EDF42DB-BF41-4C94-8BDB-EB37D90B77EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
"matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16867F98-C635-4507-B5A9-BD19181B1E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8473D554-26FD-4D38-92FC-EE3EE2F3D30A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F131955B-CDE7-48BC-9F64-E56BC90F2695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
"matchCriteriaId": "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*",
"matchCriteriaId": "4C6A9A84-B0B4-4560-BF84-9C0C675A37E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*",
"matchCriteriaId": "8354057B-818A-4BCC-87C3-3EED472B17F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F918F12-DC72-45B0-B776-3F744F12F3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD2CF99-7556-427B-BCE5-980BBADC4294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
"matchCriteriaId": "5367C3D5-583A-4942-828F-DD9C8790C93A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
"matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "793FC8D9-A500-4D21-858F-97CE380C3774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C0C970-2EB3-489A-AFA5-3066B78D2A32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCA10A45-3421-48A0-82D7-1605641E0AAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B604D3F1-98B9-487E-8E45-5BAC514689F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F4D6201-495A-4EEC-876F-09B58C1D700F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "926FC1F1-C2D1-439C-9A43-B38399A1C363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9CDFB025-A93A-441C-84B6-EBB0902A5559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1345465E-2B83-40FE-BC6B-536E0A2260D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
"matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF76E1E2-3EE9-4560-B138-06347ECA3B4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6DED72B-DBB7-4E51-AD6D-75EE407A3817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*",
"matchCriteriaId": "D97C1243-BBEB-44AC-96E1-AC46F946EA42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
},
{
"lang": "es",
"value": "Conmutadores Cisco Catalyst no especificados permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuesti\u00f3n es desconocida; los detalles son obtenidos exclusivamente de BID."
}
],
"id": "CVE-2005-4258",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-15T11:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/15864"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/15864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2003-1002
Vulnerability from fkie_nvd - Published: 2004-01-05 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | catalyst_6500 | * | |
| cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
| cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
| cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
| cisco | firewall_services_module | * | |
| cisco | firewall_services_module | 1.1.2 | |
| cisco | catos | 5.4\(1\) | |
| cisco | catos | 7.5\(1\) | |
| cisco | catos | 7.6\(1\) |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set."
},
{
"lang": "es",
"value": "El M\u00f3dulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda y recarga) mediante SNMPv3 cuando est\u00e1 establecido snmp-server."
}
],
"id": "CVE-2003-1002",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-01-05T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2003-1001
Vulnerability from fkie_nvd - Published: 2004-01-05 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml | Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | catalyst_6500 | * | |
| cisco | catalyst_6500_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-1 | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_6500_ws-svc-nam-2 | 3.1\(1a\) | |
| cisco | catalyst_6500_ws-x6380-nam | 2.1\(2\) | |
| cisco | catalyst_6500_ws-x6380-nam | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-1 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-1 | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 2.2\(1a\) | |
| cisco | catalyst_7600_ws-svc-nam-2 | 3.1\(1a\) | |
| cisco | catalyst_7600_ws-x6380-nam | 2.1\(2\) | |
| cisco | catalyst_7600_ws-x6380-nam | 3.1\(1a\) | |
| cisco | firewall_services_module | * | |
| cisco | firewall_services_module | 1.1.2 | |
| cisco | catos | 5.4\(1\) | |
| cisco | catos | 7.5\(1\) | |
| cisco | catos | 7.6\(1\) |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en el M\u00f3dulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda y recarga) mediante una petici\u00f3n HTTP auth para autenticaci\u00f3n TACACS+ o RADIUS."
}
],
"id": "CVE-2003-1001",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-01-05T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2007-5134 (GCVE-0-2007-5134)
Vulnerability from cvelistv5 – Published: 2007-09-27 19:00 – Updated: 2024-08-07 15:17
VLAI?
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:17:28.414Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1018743",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018743"
},
{
"name": "26988",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26988"
},
{
"name": "ADV-2007-3276",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"name": "cisco-catalyst-loopback-acl-bypass(36826)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"name": "25822",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25822"
},
{
"name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"name": "1018742",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018742"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-09-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1018743",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018743"
},
{
"name": "26988",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26988"
},
{
"name": "ADV-2007-3276",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"name": "cisco-catalyst-loopback-acl-bypass(36826)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"name": "25822",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25822"
},
{
"name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"name": "1018742",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018742"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5134",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1018743",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018743"
},
{
"name": "26988",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26988"
},
{
"name": "ADV-2007-3276",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"name": "cisco-catalyst-loopback-acl-bypass(36826)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"name": "25822",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25822"
},
{
"name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"name": "1018742",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018742"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5134",
"datePublished": "2007-09-27T19:00:00",
"dateReserved": "2007-09-27T00:00:00",
"dateUpdated": "2024-08-07T15:17:28.414Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1257 (GCVE-0-2007-1257)
Vulnerability from cvelistv5 – Published: 2007-03-03 20:00 – Updated: 2024-08-07 12:50
VLAI?
Summary
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:50:35.161Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070228 Cisco Catalyst 6000, 6500 Series and Cisco 7600 Series NAM (Network Analysis Module) Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"name": "VU#472412",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"name": "ADV-2007-0783",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"name": "24344",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24344"
},
{
"name": "22751",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22751"
},
{
"name": "33066",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33066"
},
{
"name": "oval:org.mitre.oval:def:5188",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"name": "cisco-catalyst-nam-unauthorized-access(32750)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"name": "1017710",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017710"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM\u0027s own IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070228 Cisco Catalyst 6000, 6500 Series and Cisco 7600 Series NAM (Network Analysis Module) Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"name": "VU#472412",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"name": "ADV-2007-0783",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"name": "24344",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24344"
},
{
"name": "22751",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22751"
},
{
"name": "33066",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33066"
},
{
"name": "oval:org.mitre.oval:def:5188",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"name": "cisco-catalyst-nam-unauthorized-access(32750)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"name": "1017710",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017710"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1257",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM\u0027s own IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070228 Cisco Catalyst 6000, 6500 Series and Cisco 7600 Series NAM (Network Analysis Module) Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"name": "VU#472412",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"name": "ADV-2007-0783",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"name": "24344",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24344"
},
{
"name": "22751",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22751"
},
{
"name": "33066",
"refsource": "OSVDB",
"url": "http://osvdb.org/33066"
},
{
"name": "oval:org.mitre.oval:def:5188",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"name": "cisco-catalyst-nam-unauthorized-access(32750)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"name": "1017710",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017710"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1257",
"datePublished": "2007-03-03T20:00:00",
"dateReserved": "2007-03-03T00:00:00",
"dateUpdated": "2024-08-07T12:50:35.161Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4258 (GCVE-0-2005-4258)
Vulnerability from cvelistv5 – Published: 2005-12-15 11:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.592Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-catalyst-land-dos(44543)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15864"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4258",
"datePublished": "2005-12-15T11:00:00",
"dateReserved": "2005-12-15T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.592Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1002 (GCVE-0-2003-1002)
Vulnerability from cvelistv5 – Published: 2003-12-17 05:00 – Updated: 2024-09-16 18:56
VLAI?
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:12:35.535Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-12-17T05:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1002",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1002",
"datePublished": "2003-12-17T05:00:00Z",
"dateReserved": "2003-12-16T00:00:00Z",
"dateUpdated": "2024-09-16T18:56:00.738Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1001 (GCVE-0-2003-1001)
Vulnerability from cvelistv5 – Published: 2003-12-17 05:00 – Updated: 2024-09-16 16:32
VLAI?
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:12:35.507Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-12-17T05:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1001",
"datePublished": "2003-12-17T05:00:00Z",
"dateReserved": "2003-12-16T00:00:00Z",
"dateUpdated": "2024-09-16T16:32:54.654Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-5134 (GCVE-0-2007-5134)
Vulnerability from nvd – Published: 2007-09-27 19:00 – Updated: 2024-08-07 15:17
VLAI?
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:17:28.414Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1018743",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018743"
},
{
"name": "26988",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26988"
},
{
"name": "ADV-2007-3276",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"name": "cisco-catalyst-loopback-acl-bypass(36826)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"name": "25822",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25822"
},
{
"name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"name": "1018742",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018742"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-09-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1018743",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018743"
},
{
"name": "26988",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26988"
},
{
"name": "ADV-2007-3276",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"name": "cisco-catalyst-loopback-acl-bypass(36826)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"name": "25822",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25822"
},
{
"name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"name": "1018742",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018742"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5134",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1018743",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018743"
},
{
"name": "26988",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26988"
},
{
"name": "ADV-2007-3276",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3276"
},
{
"name": "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2007/Sep/0573.html"
},
{
"name": "cisco-catalyst-loopback-acl-bypass(36826)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826"
},
{
"name": "25822",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25822"
},
{
"name": "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml"
},
{
"name": "1018742",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018742"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5134",
"datePublished": "2007-09-27T19:00:00",
"dateReserved": "2007-09-27T00:00:00",
"dateUpdated": "2024-08-07T15:17:28.414Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1257 (GCVE-0-2007-1257)
Vulnerability from nvd – Published: 2007-03-03 20:00 – Updated: 2024-08-07 12:50
VLAI?
Summary
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:50:35.161Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20070228 Cisco Catalyst 6000, 6500 Series and Cisco 7600 Series NAM (Network Analysis Module) Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"name": "VU#472412",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"name": "ADV-2007-0783",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"name": "24344",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24344"
},
{
"name": "22751",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22751"
},
{
"name": "33066",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33066"
},
{
"name": "oval:org.mitre.oval:def:5188",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"name": "cisco-catalyst-nam-unauthorized-access(32750)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"name": "1017710",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017710"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM\u0027s own IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20070228 Cisco Catalyst 6000, 6500 Series and Cisco 7600 Series NAM (Network Analysis Module) Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"name": "VU#472412",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"name": "ADV-2007-0783",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"name": "24344",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24344"
},
{
"name": "22751",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22751"
},
{
"name": "33066",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33066"
},
{
"name": "oval:org.mitre.oval:def:5188",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"name": "cisco-catalyst-nam-unauthorized-access(32750)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"name": "1017710",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017710"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1257",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM\u0027s own IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070228 Cisco Catalyst 6000, 6500 Series and Cisco 7600 Series NAM (Network Analysis Module) Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml"
},
{
"name": "VU#472412",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/472412"
},
{
"name": "ADV-2007-0783",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0783"
},
{
"name": "24344",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24344"
},
{
"name": "22751",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22751"
},
{
"name": "33066",
"refsource": "OSVDB",
"url": "http://osvdb.org/33066"
},
{
"name": "oval:org.mitre.oval:def:5188",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188"
},
{
"name": "cisco-catalyst-nam-unauthorized-access(32750)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750"
},
{
"name": "1017710",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017710"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1257",
"datePublished": "2007-03-03T20:00:00",
"dateReserved": "2007-03-03T00:00:00",
"dateUpdated": "2024-08-07T12:50:35.161Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4258 (GCVE-0-2005-4258)
Vulnerability from nvd – Published: 2005-12-15 11:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.592Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-catalyst-land-dos(44543)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15864"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4258",
"datePublished": "2005-12-15T11:00:00",
"dateReserved": "2005-12-15T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.592Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1002 (GCVE-0-2003-1002)
Vulnerability from nvd – Published: 2003-12-17 05:00 – Updated: 2024-09-16 18:56
VLAI?
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:12:35.535Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-12-17T05:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1002",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1002",
"datePublished": "2003-12-17T05:00:00Z",
"dateReserved": "2003-12-16T00:00:00Z",
"dateUpdated": "2024-09-16T18:56:00.738Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1001 (GCVE-0-2003-1001)
Vulnerability from nvd – Published: 2003-12-17 05:00 – Updated: 2024-09-16 16:32
VLAI?
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:12:35.507Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-12-17T05:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20031215 Cisco FWSM Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1001",
"datePublished": "2003-12-17T05:00:00Z",
"dateReserved": "2003-12-16T00:00:00Z",
"dateUpdated": "2024-09-16T16:32:54.654Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}