Search criteria
8 vulnerabilities found for catalyst_8500 by cisco
CVE-2021-1620 (GCVE-0-2021-1620)
Vulnerability from cvelistv5 ā Published: 2021-09-23 02:31 ā Updated: 2024-11-07 21:51
VLAI?
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
Severity ?
7.7 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:18:10.394Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1620",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:40:25.956619Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:51:30.491Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-09-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-563",
"description": "CWE-563",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-09-23T02:31:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr"
}
],
"source": {
"advisory": "cisco-sa-ikev2-ebFrwMPr",
"defect": [
[
"CSCvw25564"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-09-22T16:00:00",
"ID": "CVE-2021-1620",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.7",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-563"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr"
}
]
},
"source": {
"advisory": "cisco-sa-ikev2-ebFrwMPr",
"defect": [
[
"CSCvw25564"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1620",
"datePublished": "2021-09-23T02:31:01.213819Z",
"dateReserved": "2020-11-13T00:00:00",
"dateUpdated": "2024-11-07T21:51:30.491Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4258 (GCVE-0-2005-4258)
Vulnerability from cvelistv5 ā Published: 2005-12-15 11:00 ā Updated: 2024-08-07 23:38
VLAI?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.592Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-catalyst-land-dos(44543)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15864"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4258",
"datePublished": "2005-12-15T11:00:00",
"dateReserved": "2005-12-15T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.592Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0895 (GCVE-0-2001-0895)
Vulnerability from cvelistv5 ā Published: 2002-06-25 04:00 ā Updated: 2024-08-08 04:37
VLAI?
Summary
Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:37:06.659Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#399355",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"name": "20011115 Cisco IOS ARP Table Overwrite Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"name": "807",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/807"
},
{
"name": "3547",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3547"
},
{
"name": "cisco-arp-overwrite-table(7547)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-11-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router\u0027s interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-03-02T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#399355",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"name": "20011115 Cisco IOS ARP Table Overwrite Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"name": "807",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/807"
},
{
"name": "3547",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3547"
},
{
"name": "cisco-arp-overwrite-table(7547)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0895",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router\u0027s interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#399355",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"name": "20011115 Cisco IOS ARP Table Overwrite Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"name": "807",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/807"
},
{
"name": "3547",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3547"
},
{
"name": "cisco-arp-overwrite-table(7547)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0895",
"datePublished": "2002-06-25T04:00:00",
"dateReserved": "2002-01-31T00:00:00",
"dateUpdated": "2024-08-08T04:37:06.659Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-1620 (GCVE-0-2021-1620)
Vulnerability from nvd ā Published: 2021-09-23 02:31 ā Updated: 2024-11-07 21:51
VLAI?
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
Severity ?
7.7 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:18:10.394Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1620",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:40:25.956619Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:51:30.491Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-09-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-563",
"description": "CWE-563",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-09-23T02:31:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr"
}
],
"source": {
"advisory": "cisco-sa-ikev2-ebFrwMPr",
"defect": [
[
"CSCvw25564"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-09-22T16:00:00",
"ID": "CVE-2021-1620",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.7",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-563"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr"
}
]
},
"source": {
"advisory": "cisco-sa-ikev2-ebFrwMPr",
"defect": [
[
"CSCvw25564"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1620",
"datePublished": "2021-09-23T02:31:01.213819Z",
"dateReserved": "2020-11-13T00:00:00",
"dateUpdated": "2024-11-07T21:51:30.491Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4258 (GCVE-0-2005-4258)
Vulnerability from nvd ā Published: 2005-12-15 11:00 ā Updated: 2024-08-07 23:38
VLAI?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.592Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "cisco-catalyst-land-dos(44543)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/15864"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4258",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "cisco-catalyst-land-dos(44543)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"name": "15864",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15864"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4258",
"datePublished": "2005-12-15T11:00:00",
"dateReserved": "2005-12-15T00:00:00",
"dateUpdated": "2024-08-07T23:38:51.592Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0895 (GCVE-0-2001-0895)
Vulnerability from nvd ā Published: 2002-06-25 04:00 ā Updated: 2024-08-08 04:37
VLAI?
Summary
Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:37:06.659Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#399355",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"name": "20011115 Cisco IOS ARP Table Overwrite Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"name": "807",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/807"
},
{
"name": "3547",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3547"
},
{
"name": "cisco-arp-overwrite-table(7547)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-11-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router\u0027s interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-03-02T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#399355",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"name": "20011115 Cisco IOS ARP Table Overwrite Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"name": "807",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/807"
},
{
"name": "3547",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3547"
},
{
"name": "cisco-arp-overwrite-table(7547)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0895",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router\u0027s interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#399355",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"name": "20011115 Cisco IOS ARP Table Overwrite Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"name": "807",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/807"
},
{
"name": "3547",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3547"
},
{
"name": "cisco-arp-overwrite-table(7547)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0895",
"datePublished": "2002-06-25T04:00:00",
"dateReserved": "2002-01-31T00:00:00",
"dateUpdated": "2024-08-08T04:37:06.659Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2005-4258
Vulnerability from fkie_nvd - Published: 2005-12-15 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7426171-91E9-4369-88F8-469D2D70FF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*",
"matchCriteriaId": "2795A59A-0157-4EE3-B8B7-946DB7BEACA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*",
"matchCriteriaId": "AF84505D-5736-46AC-8723-230EEB80870F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA369237-AEDC-42C2-BAFA-4FE370A28E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70F6296A-4C3C-4A88-B1A4-3EB971339F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*",
"matchCriteriaId": "D89FB0BB-64D2-4385-9302-FDCB05F92345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD87934C-057F-4EB3-9B42-2136A69A5AC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23F65F67-4C3B-42A2-ACD7-4590FF3125E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBBC2D9-67D3-47FB-A627-7703A5440B34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85876B6F-DE52-4FC2-85E9-3639B2894A90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
"matchCriteriaId": "E38034CB-72FD-4E96-A3E3-0B555EC54A7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
"matchCriteriaId": "5C3745E0-4918-40AD-A219-111DC81CF766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26EAFC2E-8385-4A04-A761-EC54011A333C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88256AC6-6E27-40E6-9714-398DEF763D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E61F8C4A-1B97-4550-A465-3157A51E5D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5388120C-0B85-4029-9A6C-EFFD282F23EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B539EED0-16A3-4F4F-8791-F90FDA13520B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC79C1CD-FC2D-4667-A92E-8C87ECE04128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15CC7BDB-8C89-43AB-A514-8FC23092DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CFE777F-AC93-4598-A406-C437BB1FFCE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1354FE59-7DB1-4CFE-9149-40EA1CE7B000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C96219-7521-4F11-A222-9BCAB0B9B9D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA122273-0B84-4CE6-AAF6-F89E1F986C33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83227C65-2708-4974-BDCE-07F9849CC921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC517907-C094-4B7F-8073-480DE18CDD75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04831AE8-B21E-4674-AD14-9E98AF50D250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*",
"matchCriteriaId": "87DF7111-AC30-4B16-8EF9-C21E0280808F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*",
"matchCriteriaId": "FC9179DB-C0A8-4B9C-BC17-B9EA55C9B731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*",
"matchCriteriaId": "F37FE8BD-1434-4F1D-B207-D5C8E48344AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*",
"matchCriteriaId": "0F51C943-BBD4-4CAD-8F57-FABECDC469E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8348B895-7B3F-40CB-8843-02DBD28FC6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E27A63C6-255D-449F-B00B-4EB4060ED7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*",
"matchCriteriaId": "0EDF42DB-BF41-4C94-8BDB-EB37D90B77EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50E25997-76B2-46FF-8426-8F40002BEE78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23267E55-E098-41F5-9B9A-E1919214B579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324DE8A5-FA75-4758-8775-65051504259F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
"matchCriteriaId": "843C8691-3CB5-4C7E-A6C0-47625387CF33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16867F98-C635-4507-B5A9-BD19181B1E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8473D554-26FD-4D38-92FC-EE3EE2F3D30A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F131955B-CDE7-48BC-9F64-E56BC90F2695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
"matchCriteriaId": "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*",
"matchCriteriaId": "4C6A9A84-B0B4-4560-BF84-9C0C675A37E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*",
"matchCriteriaId": "8354057B-818A-4BCC-87C3-3EED472B17F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0BF0BBC8-04BD-4867-B188-35461E50FF16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C959C93D-D58C-4AB5-9058-0CF257C68F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC58B690-8D30-4A04-82AA-A827F87DEE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "41491D13-A3F9-464A-A84B-A58320838CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F918F12-DC72-45B0-B776-3F744F12F3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD2CF99-7556-427B-BCE5-980BBADC4294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
"matchCriteriaId": "5367C3D5-583A-4942-828F-DD9C8790C93A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
"matchCriteriaId": "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6353A76-2075-4245-94C5-D23BF9C03732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32583745-9640-4032-B1E1-598ABB4E89A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "793FC8D9-A500-4D21-858F-97CE380C3774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C0C970-2EB3-489A-AFA5-3066B78D2A32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCA10A45-3421-48A0-82D7-1605641E0AAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B604D3F1-98B9-487E-8E45-5BAC514689F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "851920E3-2DF8-4C74-84E0-E3950D2EA672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFAF3474-E030-4AF5-8BE0-966191D15E16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C8EF024C-80B1-4332-ADDC-992C5F933562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5F4D6201-495A-4EEC-876F-09B58C1D700F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6323C88E-C966-42FC-957F-EC244744A5D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD63DBE5-2149-46FF-B272-2E5A3C382548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04E2E594-8B82-476B-96A6-C713FE1FA06D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D7837C26-C795-4FAC-A11B-149C41B34A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9229B19E-B65E-4C23-8F35-7019050E24B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "587031FB-E0AF-4BD0-8809-8690D3814F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2055E432-9939-48F7-A4BE-1888CC7241C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "C21CF907-707A-43CA-984C-310062705C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "46DC4972-7FA1-4320-83E6-607D139121EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "339DDB07-6C16-43B9-A880-77E2351B1C05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCB451E-8945-408C-94F5-36C43AA05C1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F30211-BB7A-41D3-946F-655C028A3772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "01AE0EAB-F266-437A-B615-69536AF50B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD50773D-8E63-45C7-A52D-D7B13F65327F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "282793F1-296C-423A-9A2D-301DC3340664",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "020B669B-DE6B-4828-BB44-D99EE576B79D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9627888A-F522-4A41-8B14-F0E7096509FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "926FC1F1-C2D1-439C-9A43-B38399A1C363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C9BCB53-72AA-426F-9D18-544038B65128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9CDFB025-A93A-441C-84B6-EBB0902A5559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9CE2412-CFB8-42B0-B39E-84569C922952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1345465E-2B83-40FE-BC6B-536E0A2260D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
"matchCriteriaId": "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B791566-5B22-452D-ACDA-A1085700AE2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "904FC5E4-6BE0-4B15-8283-26F92922B78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F47A997-B2A5-459D-8089-12B2AB438FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF76E1E2-3EE9-4560-B138-06347ECA3B4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "567897E0-416B-47D8-ABAF-412DA5FF9509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E6DED72B-DBB7-4E51-AD6D-75EE407A3817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*",
"matchCriteriaId": "D97C1243-BBEB-44AC-96E1-AC46F946EA42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID."
},
{
"lang": "es",
"value": "Conmutadores Cisco Catalyst no especificados permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuesti\u00f3n es desconocida; los detalles son obtenidos exclusivamente de BID."
}
],
"id": "CVE-2005-4258",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-15T11:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/15864"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/15864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2001-0895
Vulnerability from fkie_nvd - Published: 2001-11-15 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | catalyst_2900xl | * | |
| cisco | catalyst_2948g-l3 | * | |
| cisco | catalyst_2950 | * | |
| cisco | catalyst_3500xl | * | |
| cisco | catalyst_3550 | * | |
| cisco | catalyst_4000 | * | |
| cisco | catalyst_4908g-l3 | * | |
| cisco | catalyst_5000 | * | |
| cisco | catalyst_6000 | * | |
| cisco | catalyst_8500 | * | |
| cisco | distributed_director | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_2900xl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "608C95E6-75D1-4A04-83B4-F9785CD25F79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3500xl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9229CAAE-1582-43DE-B727-881D0E3ABB9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83198D7C-C205-44AF-901F-6BD6D5C36244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B75201F-F007-4612-A3F0-ABC75C730F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:distributed_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F61E4FE9-24E4-4360-B606-488CB1EB7278",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router\u0027s interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table."
}
],
"id": "CVE-2001-0895",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2001-11-15T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/807"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/3547"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/IOS-arp-overwrite-vuln-pub.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/399355"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/807"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/3547"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7547"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}