All the vulnerabilites related to cisco - firewall_services_module_software
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972." }, { "lang": "es", "value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de Cisco Catalyst 6500 series, con software 7.0 anteriores a 7.0(8.13), 7.1 y 7.2 anteriores a 7.2(5.4), 8.0 anteriores a 8.0(5.25), 8.1 y 8.2 anteriores a 8.2(5.11), 8.3 anteriores a 8.3(2.23), 8.4 anteriores a 8.4(2.6), y 8.5 anteriores a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de tr\u00e1fico SunRPC modificado. Tambi\u00e9n conocido como Bug IDs CSCto92380 and CSCtq09972." } ], "id": "CVE-2011-3299", "lastModified": "2024-11-21T01:30:13.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.393", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986." }, { "lang": "es", "value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de Cisco Catalyst 6500 series, con software 7.0 anteriores a 7.0(8.13), 7.1 y 7.2 anteriores a 7.2(5.4), 8.0 anteriores a 8.0(5.25), 8.1 y 8.2 anteriores a 8.2(5.11), 8.3 anteriores a 8.3(2.23), 8.4 anteriores a 8.4(2.6), y 8.5 anteriores a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de tr\u00e1fico SunRPC modificado. Tambi\u00e9n conocido como Bug IDs CSCtq06062 y CSCtq09986." } ], "id": "CVE-2011-3301", "lastModified": "2024-11-21T01:30:13.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.487", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/76088" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/76088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875." }, { "lang": "es", "value": "Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 antes de v3.1(21), v3.2 antes de v3.2(22), v4.0 antes de v4.0(16), y v4.1 antes de v4.1(7), cuando se utiliza IPv6, permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda o bloqueo del m\u00f3dulo) a trav\u00e9s de vectores que desencadenan un mensaje de syslog 302015. Se trata de un problema tambi\u00e9n conocido como Bug ID CSCti83875." } ], "id": "CVE-2011-3296", "lastModified": "2024-11-21T01:30:12.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.143", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802." }, { "lang": "es", "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500, y el m\u00f3dulo ASA Services en dispositivos Cisco Catalyst 6500, con software v7.0 anteriores a v7.0(8.13), v7.1 y v7.2 anteriores a v7.2(5.4), v8.0 anteriores a v8.0(5.25), v8.1 anteriores a v8.1(2.50), v8.2 anteriores a v8.2(5.6), v8.3 anteriores a v8.3(2.23), v8.4 anteriores a v8.4(2.7), y v8.5 anteriores a v8.5(1.1) y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anteriores a v3.1(21), v3.2 anteriores a v3.2(22), v4.0 anteriores a v4.0(16), y v4.1 anteriores a v4.1(7) permite a atacantes remotos a provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de tr\u00e1fico ILS manipulado, tambi\u00e9n conocido como Bug IDs CSCtq57697 y CSCtq57802." } ], "id": "CVE-2011-3303", "lastModified": "2024-11-21T01:30:14.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.597", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/76090" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/76090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697." }, { "lang": "es", "value": "Cisco Firewall Services Module (FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7), si determinadas configuraciones de autenticaci\u00f3n son usadas, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del m\u00f3dulo) haciendo muchas peticiones de autenticaci\u00f3n para el acceso a red. Tambi\u00e9n conocido como Bug ID CSCtn15697." } ], "id": "CVE-2011-3297", "lastModified": "2024-11-21T01:30:13.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.300", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPCen el m\u00f3dulo Cisco Firewall Services Module (FWSM) con software v3.1 anteriores a v3.1(17.2), v3.2 anteriores a v3.2(16.1), v4.0 anteriores a v4.0(10.1), y v4.1 anteriores a v4.1(1.1) para switchs serie Catalyst 6500 y routers serie 7600, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC manipulados, tambi\u00e9n conocido como Bug ID CSCte61662." } ], "id": "CVE-2010-2820", "lastModified": "2024-11-21T01:17:26.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.723", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978." }, { "lang": "es", "value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de Cisco Catalyst 6500 series, con software 7.0 anteriores a 7.0(8.13), 7.1 y 7.2 anteriores a 7.2(5.4), 8.0 anteriores a 8.0(5.25), 8.1 y 8.2 anteriores a 8.2(5.11), 8.3 anteriores a 8.3(2.23), 8.4 anteriores a 8.4(2.6), y 8.5 anteriores a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anteriores a 3.1(21), 3.2 anteriores a 3.2(22), 4.0 anteriores a 4.0(16), y 4.1 anteriores a 4.1(7) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de tr\u00e1fico SunRPC modificado. Tambi\u00e9n conocido como Bug IDs CSCtq06065 and CSCtq09978." } ], "id": "CVE-2011-3300", "lastModified": "2024-11-21T01:30:13.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.440", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/76087" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/76087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firewall_services_module_software | 3.2 | |
cisco | firewall_services_module_software | 3.2\(1\) | |
cisco | firewall_services_module_software | 3.2\(2\) | |
cisco | firewall_services_module_software | 3.2\(3\) | |
cisco | firewall_services_module_software | 3.2\(13\) | |
cisco | firewall_services_module_software | 3.2\(14\) | |
cisco | firewall_services_module_software | 3.2\(16\) | |
cisco | firewall_services_module_software | 4.0 | |
cisco | firewall_services_module_software | 4.0\(4\) | |
cisco | firewall_services_module_software | 4.0\(6\) | |
cisco | firewall_services_module_software | 4.0\(7\) | |
cisco | firewall_services_module_software | 4.0\(8\) | |
cisco | firewall_services_module_software | 4.0\(10\) | |
cisco | firewall_services_module_software | 4.1 | |
cisco | firewall_services_module_software | 4.1\(1\) | |
cisco | catalyst_6500 | * | |
cisco | catalyst_7600 | * | |
cisco | firewall_services_module | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694." }, { "lang": "es", "value": "Vulnerabilidad no especificada en en el m\u00f3dulo Cisco Firewall Services Module (FWSM) con software v3.2 anteriores a v3.2(17.2), v4.0 anteriores a v4.0(11.1), y v4.1 anteriores a v4.1(1.2) para los switchs serie Catalyst 6500 y routers de la serie 7600, cuando est\u00e1 activado el modo multimodo, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de una manipulaci\u00f3n de (1) Telnet, (2) SSH, o (3) tr\u00e1fico ASDM sobre TCP, tambi\u00e9n conocido como Bug ID CSCtg68694." } ], "id": "CVE-2010-2821", "lastModified": "2024-11-21T01:17:26.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.737", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en el m\u00f3dulo Cisco Firewall Services Module (FWSM) con software v3.1 anteriores a v3.1(17.2), v3.2 anteriores a v3.2(16.1), v4.0 anteriores a v4.0(10.1), y v4.1 anteriores a v4.1(1.1) para switchs serie Catalyst 6500 y routers serie 7600, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC manipulados, tambi\u00e9n conocido como Bug ID CSCte61710." } ], "id": "CVE-2010-2818", "lastModified": "2024-11-21T01:17:26.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.660", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-13 10:20
Modified
2024-11-21 01:57
Severity ?
Summary
The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C82C545-6796-4B67-A97D-0435D41C63C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA336EBF-FA9A-4B80-A486-446A1C4B72F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F8B53107-BCD0-4D3E-B090-91D6BD6139C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.28\\):*:*:*:*:*:*:*", "matchCriteriaId": "55F688FD-23D2-473D-A341-32AF4E7FAAAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.31\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA5D4788-D122-46B8-91BE-023D5A13C88E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "785388F5-E76A-4762-B498-35F69CE537AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*", "matchCriteriaId": "4411AB6B-FC27-45B6-A9D3-45DB64D14357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*", "matchCriteriaId": "13E658D9-155B-4567-A3F8-5F45F53457CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.34\\):*:*:*:*:*:*:*", "matchCriteriaId": "37D8E4C6-9CF5-40DD-852E-B9623CDBE5B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.37\\):*:*:*:*:*:*:*", "matchCriteriaId": "03794CAA-06A3-4FD8-BF00-B9A7BAE59704", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5990B883-0B5A-44F0-B4DC-8031ED0F2026", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*", "matchCriteriaId": "E5A002AD-3EB0-43CB-AFAF-4A44DAF11007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7F417BC-5835-4F29-8DB6-03A62B7B2364", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A914DE5-2269-451A-823A-B26AE1A7F980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "4956430E-BEC1-4788-B0D2-E50E36C70306", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0271E71-11A1-410F-A34B-5E90FE009D4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "747A3577-3D68-4F23-B465-5A40035C2246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC22FC-55C8-4B87-96BF-BE058E958BB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "4154E951-DE5D-4D48-B5BA-B3CCDDA3FBA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "02BF5B23-58BD-4D1F-9F5B-30EE518E8D23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "2BFCE154-6582-49E2-9B9D-641986B7D653", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "563181F6-6A37-496B-AE25-0D03214BA7BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "62558016-D31D-405E-A264-40DBBDF23887", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3CF663E3-9CA5-4E11-B58F-CAC012F2C397", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\(1.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "E4FDA1C7-3CFC-4DFC-8DE7-ED54636ED1A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "04C8C6E9-D5C3-42DC-B431-9097B2FCCB52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "75B5CF41-7F01-4AE9-B54B-8DB6909504B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "F995B807-32A2-401F-99D5-FBBA8B69E844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "B64230D9-75E1-40C0-8889-43F1035F5B60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AE5E2B1-75AA-48F5-84ED-0614BBDDC6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "435C51F7-2BE8-4D1D-86E7-A33B62F5C391", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "819E1846-433A-40D6-9486-FB7A06012372", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E0B275-5079-4F1A-97DA-941060AF1FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "01091FAB-8442-4063-967C-C7EB2CC25F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "459DF4FE-C2D9-4760-B6DB-1FF8448F6A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C10D6A21-B5E9-46BB-80EB-2D7D7FACA30D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "30291BE6-3E77-4487-A590-F083BBD2B1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C830B4B-5CDE-4192-BF84-B6DF58CC6518", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(23\\):*:*:*:*:*:*:*", "matchCriteriaId": "DC1E6C09-7F44-4EB4-96FF-E23D9C11BC4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(24\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B0A8ED1-3927-476D-8BEB-7D74469E419E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(25\\):*:*:*:*:*:*:*", "matchCriteriaId": "4E646C2D-1320-413F-B3EF-90DD82E381DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(26\\):*:*:*:*:*:*:*", "matchCriteriaId": "75D3E203-F5E1-494A-A45F-D73BC39CB323", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434." }, { "lang": "es", "value": "El motor de SQL*Net inspection en Cisco Adaptive Security Appliance (ASA) 7.x anteriores a 7.2(5.12), 8.x anteriores a 8.2(5.44), 8.3.x anteriores a 8.3(2.39), 8.4.x anteriores a 8.4(6), 8.5.x anteriores a 8.5(1.18), 8.6.x anteriores a 8.6(1.12), 8.7.x anteriores a 8.7(1.6), 9.0.x anteriores a 9.0(2.10) y 9.1.x anteriores a 9.1(2) y Firewall Services Modue (FWSM) 3.1.x y 3.2.x anteriores a 3.2(27) y 4.x anteriores a 4.1(14) permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes segmentados Transparent Network Substrate (TNS) manipulados, tambien conocido como Bug ID CSCub98434." } ], "id": "CVE-2013-5508", "lastModified": "2024-11-21T01:57:36.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-13T10:20:04.270", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2024-11-21 01:23
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F102F5EF-0B67-4FD7-898E-D5EDD8B822D5", "versionEndIncluding": "8.3\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C82C545-6796-4B67-A97D-0435D41C63C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA336EBF-FA9A-4B80-A486-446A1C4B72F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F8B53107-BCD0-4D3E-B090-91D6BD6139C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "39983B88-A340-4712-9E5C-C3D492DDF09C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E29A007-4664-4822-AC78-7C0153417D9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "822A8177-A69D-495E-9437-E5567A27F60D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "1226F8D6-7402-457B-8AEC-7164D735ECF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "04F7CD17-7EAC-4B77-8F59-8EB5362091DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "97CC4932-94B6-447E-8294-D6732B46CB41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4E03AD49-1267-4866-A059-DE97EA79D769", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "889F34A9-81CD-4381-9708-A2481C95FE21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "26E8B157-67EF-4DFB-BFBB-7794A048E43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952." }, { "lang": "es", "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.11), v7.1 y v7.2 anterior a v7.2(5.1), v8.0 anterior a v8.0 (5.19), v8.1 anterior a v8.1 (2.47), v8.2 anterior a v8.2 (2.19), y v8.3 anterior a v8.3 (1.8); dispositivos Cisco PIX Security Appliances Serie 500; y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anterior a v3.1 (20), v3.2 anterior a v3.2 (20), v4.0 anterior a v4.0 (15), y v4.1 anterior a v4.1(5) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje Skinny Client Control Protocol (SCCP) manipulado, tambi\u00e9n conocido como error ID CSCtg69457 y CSCtl84952." } ], "id": "CVE-2011-0394", "lastModified": "2024-11-21T01:23:52.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-25T12:00:19.213", "references": [ { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/43453" }, { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/43488" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/46518" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025108" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025109" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "source": "ykramarz@cisco.com", "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989." }, { "lang": "es", "value": "Dispositivos de las series Cisco Adaptive Security Appliances (ASA ) 5500, y el m\u00f3dulo de ASA en dispositivos de la serie Cisco Catalyst 6500, con el software v7.0 anteriores a v7.0(8.13), v7.1 y v7.2 anteriores a v7.2(5.4), v8.0 anteriores a v8.0(5.25), v8.1 y v8.2 anteriores a v8.2(5.11), v8.3 anteriores a v8.3(2.23), v8.4 anteriores a v8.4(2.6), y v8.5 anteriores a v8.5(1.1) y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anteriores a v3.1(21), v3.2 anteriores a v3.2(22), v4.0 anteriores a v4.0(16), y v4.1 anteriores a v4.1(7) permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s del tr\u00e1fico SunRPC manipulado, tambi\u00e9n conocido como Bug IDs CSCto92398 y CSCtq09989." } ], "id": "CVE-2011-3302", "lastModified": "2024-11-21T01:30:13.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.550", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/76089" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/76089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-11 10:55
Modified
2024-11-21 01:49
Severity ?
Summary
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624." }, { "lang": "es", "value": "La funcionalidad de autenticaci\u00f3n de proxy en Cisco Firewall Services Module (FWSM) software v3.1 y v3.2 antes de v3.2(20.1), v4.0 antes de v4.0(15.2), y v4.1 antes de v4.1(5.1) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de una URL hecha a mano, tambi\u00e9n conocido como Bug ID CSCtg02624." } ], "id": "CVE-2013-1155", "lastModified": "2024-11-21T01:49:00.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-11T10:55:01.857", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-03-15 00:55
Modified
2024-11-21 01:34
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "30291BE6-3E77-4487-A590-F083BBD2B1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C830B4B-5CDE-4192-BF84-B6DF58CC6518", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AE5E2B1-75AA-48F5-84ED-0614BBDDC6B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C82C545-6796-4B67-A97D-0435D41C63C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA336EBF-FA9A-4B80-A486-446A1C4B72F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F8B53107-BCD0-4D3E-B090-91D6BD6139C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C15D1F6-997D-47FD-A654-AEF3332E6105", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5990B883-0B5A-44F0-B4DC-8031ED0F2026", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*", "matchCriteriaId": "E5A002AD-3EB0-43CB-AFAF-4A44DAF11007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7F417BC-5835-4F29-8DB6-03A62B7B2364", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A914DE5-2269-451A-823A-B26AE1A7F980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "4956430E-BEC1-4788-B0D2-E50E36C70306", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "4154E951-DE5D-4D48-B5BA-B3CCDDA3FBA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F202892E-2E58-4D77-B983-38AFA51CDBC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE25114-ABBC-47A0-9C20-E8D40D721313", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADD5F49-2817-40EC-861C-C922825708BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E628F9C4-98C6-4A95-AF81-F1E6A56E8648", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AFF899C-1EB3-46D8-9003-EA36A68C90B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6463491-F63E-44CB-A1D4-C029BE7D3D3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8668D34-096B-4FC3-B9B1-0ECFD6265778", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367." }, { "lang": "es", "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 y el M\u00f3dulo de Servicios de ASA (ASASM) en dispositivos Cisco Catalyst 6500, con el software v7.0 a v7.2 antes de v7.2 (5.7), v8.0 antes de v8.0 (5.27), v8.1 antes de v8.1 (2.53) , v8.2 antes de v8.2 (5.8), v8.3 antes de v8.3 (2.25), v8.4 antes de v8.4 (2.5), y v8.5 antes de v8.5 (1.2) y el Firewall Services Module (FWSM) v3.1 y v3.2 antes de v3.2 (23) y v4.0 y v4.1 antes de v4.1 (8) en los dispositivos Cisco Catalyst 6500, cuando est\u00e1 habilitado el enrutamiento multicast, permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje IPv4 PIM modificado, tambi\u00e9n conocido como Bug ID CSCtr47517 y CSCtu97367." } ], "id": "CVE-2012-0356", "lastModified": "2024-11-21T01:34:50.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-15T00:55:01.053", "references": [ { "source": "ykramarz@cisco.com", "url": "http://osvdb.org/80041" }, { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/48421" }, { "source": "ykramarz@cisco.com", "url": "http://secunia.com/advisories/48423" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1026798" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1026800" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/80041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74028" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-11 10:55
Modified
2024-11-21 01:48
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C82C545-6796-4B67-A97D-0435D41C63C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA336EBF-FA9A-4B80-A486-446A1C4B72F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F8B53107-BCD0-4D3E-B090-91D6BD6139C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "785388F5-E76A-4762-B498-35F69CE537AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*", "matchCriteriaId": "4411AB6B-FC27-45B6-A9D3-45DB64D14357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*", "matchCriteriaId": "13E658D9-155B-4567-A3F8-5F45F53457CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C15D1F6-997D-47FD-A654-AEF3332E6105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "785388F5-E76A-4762-B498-35F69CE537AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5990B883-0B5A-44F0-B4DC-8031ED0F2026", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*", "matchCriteriaId": "E5A002AD-3EB0-43CB-AFAF-4A44DAF11007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7F417BC-5835-4F29-8DB6-03A62B7B2364", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A914DE5-2269-451A-823A-B26AE1A7F980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "4956430E-BEC1-4788-B0D2-E50E36C70306", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "2BFCE154-6582-49E2-9B9D-641986B7D653", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "563181F6-6A37-496B-AE25-0D03214BA7BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "04C8C6E9-D5C3-42DC-B431-9097B2FCCB52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "75B5CF41-7F01-4AE9-B54B-8DB6909504B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C830B4B-5CDE-4192-BF84-B6DF58CC6518", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(24\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B0A8ED1-3927-476D-8BEB-7D74469E419E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AE5E2B1-75AA-48F5-84ED-0614BBDDC6B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:6500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7611DDD3-9EEE-42C5-B0F6-BDA382F59308", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:7600_series_adaptive_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC3431F-EF27-4495-B25F-6B5B173CDF75", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267." }, { "lang": "es", "value": "Cisco Adaptive Security Appliances (ASA) los dispositivos con v7.x de software antes de v7.2(5.10) v8.0, antes de v8.0(5.28), v8.1 y v8.2 antes de v8.2(5.35), v8.3 antes de v8.3(2.34), v8.4 antes de v8.4(4.11), v8.6 antes de v8.6(1.10), y v8.7 antes de v8.7(1.3), y Cisco Firewall Services Module (FWSM) software v3.1 y v3.2 antes de v3.2(24.1) y v4.0 y v401 antes de v4.1(11.1), permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un elaborado IKEv1 mensaje, tambi\u00e9n conocido como Bug ID CSCub85692 y CSCud20267." } ], "id": "CVE-2013-1149", "lastModified": "2024-11-21T01:48:59.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-11T10:55:01.770", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2024-11-21 01:17
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en el m\u00f3dulo Cisco Firewall Services Module (FWSM) con software v3.1 anteriores a v3.1(17.2), v3.2 anteriores a v3.2(16.1), v4.0 anteriores a v4.0(10.1), y v4.1 anteriores a v4.1(1.1) para switchs serie Catalyst 6500 y routers serie 7600, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC manipulados, tambi\u00e9n conocido como Bug ID CSCte61662." } ], "id": "CVE-2010-2819", "lastModified": "2024-11-21T01:17:26.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-09T11:58:17.690", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "ykramarz@cisco.com", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-22 21:55
Modified
2024-11-21 02:02
Severity ?
Summary
Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "30291BE6-3E77-4487-A590-F083BBD2B1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C830B4B-5CDE-4192-BF84-B6DF58CC6518", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(23\\):*:*:*:*:*:*:*", "matchCriteriaId": "DC1E6C09-7F44-4EB4-96FF-E23D9C11BC4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(24\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B0A8ED1-3927-476D-8BEB-7D74469E419E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(25\\):*:*:*:*:*:*:*", "matchCriteriaId": "4E646C2D-1320-413F-B3EF-90DD82E381DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(26\\):*:*:*:*:*:*:*", "matchCriteriaId": "75D3E203-F5E1-494A-A45F-D73BC39CB323", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(27\\):*:*:*:*:*:*:*", "matchCriteriaId": "39D89CC5-2BD9-48FF-AD7F-63D0AE459C6B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AE5E2B1-75AA-48F5-84ED-0614BBDDC6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "435C51F7-2BE8-4D1D-86E7-A33B62F5C391", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "819E1846-433A-40D6-9486-FB7A06012372", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E0B275-5079-4F1A-97DA-941060AF1FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "01091FAB-8442-4063-967C-C7EB2CC25F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "459DF4FE-C2D9-4760-B6DB-1FF8448F6A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C10D6A21-B5E9-46BB-80EB-2D7D7FACA30D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D0B2860-2BFC-4BAE-9E9C-7C56AA063C0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824." }, { "lang": "es", "value": "Condici\u00f3n de carrera en la funcionalidad \"cut-through proxy\" en Cisco Firewall Services Module (FWSM) Software 3.x anterior a 3.2(28) y 4.x anterior a 4.1(15) permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de cierto tr\u00e1fico coincidente, tambi\u00e9n conocido como Bug ID CSCuj16824." } ], "id": "CVE-2014-0710", "lastModified": "2024-11-21T02:02:40.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-22T21:55:09.530", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-13 10:20
Modified
2024-11-21 01:57
Severity ?
Summary
The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context's configuration via unspecified commands, aka Bug ID CSCue46080.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "30291BE6-3E77-4487-A590-F083BBD2B1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C830B4B-5CDE-4192-BF84-B6DF58CC6518", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "2AE5E2B1-75AA-48F5-84ED-0614BBDDC6B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "435C51F7-2BE8-4D1D-86E7-A33B62F5C391", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "819E1846-433A-40D6-9486-FB7A06012372", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E0B275-5079-4F1A-97DA-941060AF1FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "01091FAB-8442-4063-967C-C7EB2CC25F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "459DF4FE-C2D9-4760-B6DB-1FF8448F6A48", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context\u0027s configuration via unspecified commands, aka Bug ID CSCue46080." }, { "lang": "es", "value": "La funcionalidad de autorizaci\u00f3n en Cisco Firewall Services Module (FWSM) 3.1.x y 3.2.x anterior a 3.2(25) y 4.x anterior a 4.1(13), cuando el modo multiple-context est\u00e1 habilitado, permite a usuarios locales leer o modificar cualquier configuraci\u00f3n de contexto a trav\u00e9s de comandos no especificados, tambien conocido como Bug ID CSCue46080." } ], "id": "CVE-2013-5506", "lastModified": "2024-11-21T01:57:36.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 2.7, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-13T10:20:04.223", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-06 10:55
Modified
2024-11-21 01:30
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "matchCriteriaId": "15ECB359-7290-4732-96F2-AFCEE21C7899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "88102B08-48E8-48FD-81E9-FAF717D6BE34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DA2F01C-ECF1-477B-A413-75D0EB817079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F4EA382-848E-4FE8-AE03-5DDDDBE88C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "538B700C-AA95-4D63-8148-E4D5ED08CE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DD640A-120F-487D-B364-66B69C962A35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7632C245-04C6-4E78-87B7-55CCCA6FD6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E84099EB-2535-4A9F-8355-FF937CFBD122", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C599F894-DAD2-4231-8BB8-1427E7C02D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1F60C12-71C9-47C6-B43F-A0374419D736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C853CD9-F451-406E-A515-3BDC34E55639", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C28DC-B15F-486B-96F1-D08529B7374A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B03A1408-A55A-4482-B239-B13094B13BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "matchCriteriaId": "62DC7025-F067-45CB-BEA6-ED16A5BD2896", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "4C926091-D9A6-4264-8E9A-52AFCBC09D34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "matchCriteriaId": "D55D3385-FEE7-44AA-A65A-50924FDC1BFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD3AD5D9-DD5E-4D31-9F11-94A6147F59A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC1CE86-6FD4-44D4-A3E6-D49B9CAAA0B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F0864E8-E9C5-498D-84F4-4DE02FF4852A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E853B8BF-07F5-46DF-8DEA-302F68B8B086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "95627941-30D8-452F-B6C8-76D2BEE93514", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "364CA0EA-F85E-4C4B-96D8-A7256F413844", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "67AB954E-D1F4-4B29-B782-2E9917D82DE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA3389C-86FE-45F7-97D7-E3386403944F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "788C1177-EA1F-4C89-B4D2-C3939C45472C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAFE1219-5B88-4A41-B1FA-0E3BA9FDA14A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B97D0B-974E-48E7-A5F1-AB572ACB7829", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "656D49C2-4F2E-4369-8933-FF74A3CD51EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C68E73D6-A207-4276-A972-52B859CD958A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1E406214-2776-42C2-B777-92E6420FBFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2185ED62-166C-4F43-ACA2-C1EF43C48D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73BA05D1-78A7-4F90-9448-3F2011EE3EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "33F24697-0124-4326-8499-29931D57D246", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7236893-3EE9-4DBE-8A75-5294FD82E922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "97E5BC7E-399F-4FD2-8024-2F4F621BC577", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "22E1D918-A52E-4892-9D0D-EE3E21853BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "matchCriteriaId": "333BCB8C-5B17-4EF7-9BFF-0F6B038BE38F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA8018B5-4392-4D14-A017-80D325FBCB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F2C8AFA-A4B6-44A2-B00C-1950997493C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "465313C5-BFB9-458A-8150-8F7BA1F8C386", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "matchCriteriaId": "9C808D46-C846-4C53-A713-150C3FED3FAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6A994D8-FAC3-41FD-AC1B-DA5D737A1E8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1D05BC0-BC8F-4598-B472-77FF7EE0AA09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BCF8541-6C88-49AC-B065-9CCA0279025B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FCC3678-E130-42AD-B57F-0E63AB380693", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DCA1C19-C59E-46EB-AD87-F706E324ECBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "543C12E0-4DB3-43FD-B415-1DEDA9121FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6A10634-93CE-4E13-A6BB-E21C7CB204A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9D3EC68-08FD-46FC-80B8-D9F6EE791A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8A2AE5-759D-44AA-9EFB-00E1E5969E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D1DE3A7-8769-4B3E-9F3D-11D4C0F47921", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3414D192-8805-43A1-AFFE-0BB724208D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "89D6D3CC-2D73-4D42-B398-C0980FE7C10F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "8DF6C8DB-C803-4E83-B90F-597535CF0BA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF7AEE4A-E540-4B93-A019-E6EC750EF960", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EC15E2F-0CB3-4E0B-A12F-2D9B5AE8C097", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CAB1F17-DEED-4620-9DD2-A40AA526300F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "768152F0-D84B-4853-9AA0-E7040A42DBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "E686BC6F-665C-47DF-889F-5A5D4243A8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6086BF6-5D33-4EDB-9F8F-D80E2A23713A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FBBA6A0-A0A3-4E25-877A-3018AE002E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "915C9825-863A-4673-AF9A-52BEBD770176", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF62AD07-006D-4AD6-A8E9-68EB3D930700", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F425EA4-40A6-4FD7-B2C4-150A4517AD55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B7304563-4DC9-4A0E-9AB5-DC852F58FAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "774D4F68-8331-4160-8DEB-6606D1739BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "21E72AE6-BB0C-44E8-AA28-CE19C5551725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A71325A3-E02C-47EC-A9F3-86998B4C54CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2BE5DE70-5D5A-4221-8E17-CABBDD990283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FB9669-5D07-48CC-AB64-C82E058A2AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8BF33E0-6C8C-4921-A5E3-0AFD92130180", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "00F3EBCC-F77B-49FE-9894-BD03936935CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "2017BA46-5824-4B39-B547-CBD80B245A52", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D43ED9B-2910-4391-9370-ED622648DB68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD4127BD-DC08-4352-810B-752C849AA49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1D53FAA-401B-4530-BB75-A0D2F0CBD9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2009145-F6C0-4275-A56E-E31006709A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "481B5609-CA88-4E8A-AC84-17CCA2D81D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F11F12F-96AC-4A1D-B995-B0E020F2574C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "C32B7601-AA90-421B-80F4-CC11CE390563", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "789FE084-1D9B-4779-AF61-0FDE97D2DC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "E93E5289-2866-4251-859C-A33B877E8EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "965D54CB-A558-4140-83D6-3BAD9A38FE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "97840537-1FAA-4124-A689-CC437061F549", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0A0377-13AC-4834-A266-AFCAC9FE2938", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "404B0B52-90EA-4E5D-B43C-1FE8144EAFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2C62050-0BD8-45B5-B7E6-CEF4426EEF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D30BED1-091A-46FB-A274-1778F1025849", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E37188FD-7BAE-447A-83A4-C644AE2B4B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF89057D-7C5F-428D-A15D-F386F61590D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2C1AB7-7A5D-4B8B-96B3-2DDE2A3322E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "3DEFB820-3031-4B4B-AE02-FCF2527B3BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB820815-EF7F-44F8-9330-CD879197D0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E61AFCA-5E0A-4BAF-873A-B8D2D7C5BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AE71162-46E5-455D-BA7D-C4E2DFE8F199", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "84DC9BC4-0803-4572-ACB9-136353618996", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "C7B2E3F1-7E16-414D-B14C-98CBBAA35D7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "279A740A-F87F-43F3-851F-BCFC09E37A1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "14E40E7E-892D-4975-86BD-31D28A635D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F37864F5-F1CF-4BA9-A169-FE8EF4BC98B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FCC030F-526B-4900-AD5A-9E1591FF767C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "99B72A5F-9251-476C-9071-19C06490A363", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E1B7437-8A7A-484E-983B-32E878BF091F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "81DFE660-9C82-43BE-84B6-C584EF6D85A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9F9EA36-2A8C-4C15-B0A9-E0E410610F25", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F924BC2C-36E8-452B-8AAE-CF74E5194D0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274." }, { "lang": "es", "value": "Dispositivos Cisco Adaptive Security Appliances (ASA) 5500 series, y el m\u00f3dulo ASA Services de los dispositivos Cisco Catalyst 6500 series, con software 7.0 anterior a 7.0(8.13), 7.1 y 7.2 anterior a 7.2(5.3), 8.0 anterior a 8.0(5.24), 8.1 anterior a 8.1(2.50), 8.2 anterior a 8.2(5), 8.3 anterior a 8.3(2.18), 8.4 anterior a 8.4(1.10), y 8.5 anterior a 8.5(1.1) y Cisco Firewall Services Module (aka FWSM) 3.1 anterior a 3.1(21), 3.2 anterior a 3.2(22), 4.0 anterior a 4.0(16), y 4.1 anterior a 4.1(7) permiten a atacantes remotos evitar la autenticaci\u00f3n a trav\u00e9s de respuestas TACACS+ modificadas. Tambi\u00e9n conocido como Bug IDs CSCto40365 y CSCto74274." } ], "id": "CVE-2011-3298", "lastModified": "2024-11-21T01:30:13.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-06T10:55:05.333", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2011-3302
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/76089 | vdb-entry, x_refsource_OSVDB | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70333 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76089", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/76089" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-inspection-dos(70333)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "76089", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/76089" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-inspection-dos(70333)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76089", "refsource": "OSVDB", "url": "http://osvdb.org/76089" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-inspection-dos(70333)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70333" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3302", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0710
Vulnerability from cvelistv5
Published
2014-02-22 21:00
Modified
2024-08-06 09:27
Severity ?
EPSS score ?
Summary
Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:19.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140219 Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-22T21:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140219 Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-0710", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140219 Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-0710", "datePublished": "2014-02-22T21:00:00", "dateReserved": "2014-01-02T00:00:00", "dateUpdated": "2024-08-06T09:27:19.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3296
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/70326 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-fwsm-syslog-dos(70326)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-fwsm-syslog-dos(70326)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-fwsm-syslog-dos(70326)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70326" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3296", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1155
Vulnerability from cvelistv5
Published
2013-04-11 10:00
Modified
2024-09-16 23:05
Severity ?
EPSS score ?
Summary
The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:49:20.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130410 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130410 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-1155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130410 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-1155", "datePublished": "2013-04-11T10:00:00Z", "dateReserved": "2013-01-11T00:00:00Z", "dateUpdated": "2024-09-16T23:05:45.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1149
Vulnerability from cvelistv5
Published
2013-04-11 10:00
Modified
2024-09-17 04:09
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:49:20.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130410 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa" }, { "name": "20130410 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130410 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa" }, { "name": "20130410 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-1149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130410 Multiple Vulnerabilities in Cisco ASA Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa" }, { "name": "20130410 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-1149", "datePublished": "2013-04-11T10:00:00Z", "dateReserved": "2013-01-11T00:00:00Z", "dateUpdated": "2024-09-17T04:09:24.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3298
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/70328 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-fwsm-tacacs-security-bypass(70328)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-fwsm-tacacs-security-bypass(70328)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-fwsm-tacacs-security-bypass(70328)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70328" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3298", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3297
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/70327 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-fwsm-proxy-dos(70327)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-fwsm-proxy-dos(70327)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-fwsm-proxy-dos(70327)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70327" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3297", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0356
Vulnerability from cvelistv5
Published
2012-03-15 00:00
Modified
2024-08-06 18:23
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa | vendor-advisory, x_refsource_CISCO | |
http://osvdb.org/80041 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/48423 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1026798 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74028 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1026800 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/48421 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120314 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa" }, { "name": "80041", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/80041" }, { "name": "48423", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48423" }, { "name": "1026798", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026798" }, { "name": "20120314 Cisco Firewall Services Module Crafted Protocol Independent Multicast Message Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm" }, { "name": "cisco-fwsm-pim-dos(74028)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74028" }, { "name": "1026800", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026800" }, { "name": "48421", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48421" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-12T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20120314 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa" }, { "name": "80041", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/80041" }, { "name": "48423", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48423" }, { "name": "1026798", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026798" }, { "name": "20120314 Cisco Firewall Services Module Crafted Protocol Independent Multicast Message Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm" }, { "name": "cisco-fwsm-pim-dos(74028)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74028" }, { "name": "1026800", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026800" }, { "name": "48421", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48421" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-0356", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120314 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa" }, { "name": "80041", "refsource": "OSVDB", "url": "http://osvdb.org/80041" }, { "name": "48423", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48423" }, { "name": "1026798", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026798" }, { "name": "20120314 Cisco Firewall Services Module Crafted Protocol Independent Multicast Message Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm" }, { "name": "cisco-fwsm-pim-dos(74028)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74028" }, { "name": "1026800", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026800" }, { "name": "48421", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48421" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-0356", "datePublished": "2012-03-15T00:00:00", "dateReserved": "2012-01-04T00:00:00", "dateUpdated": "2024-08-06T18:23:30.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3303
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/70329 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO | |
http://osvdb.org/76090 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.737Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-fwsm-ils-dos(70329)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "name": "76090", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/76090" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-fwsm-ils-dos(70329)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "name": "76090", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/76090" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-fwsm-ils-dos(70329)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70329" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" }, { "name": "76090", "refsource": "OSVDB", "url": "http://osvdb.org/76090" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3303", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3301
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/76088 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70332 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76088", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/76088" }, { "name": "cisco-sunrpc-inspection-dos(70332)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "76088", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/76088" }, { "name": "cisco-sunrpc-inspection-dos(70332)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76088", "refsource": "OSVDB", "url": "http://osvdb.org/76088" }, { "name": "cisco-sunrpc-inspection-dos(70332)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70332" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3301", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2819
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 16:53
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40843 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2819", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40843", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2819", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-16T16:53:38.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2820
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 18:24
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40843 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2820", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61662." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40843", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2820", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-16T18:24:26.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2821
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-17 00:30
Severity ?
EPSS score ?
Summary
Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40843 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2821", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40843", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2821", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-17T00:30:41.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2818
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-17 01:36
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40843 | third-party-advisory, x_refsource_SECUNIA | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-08-06T19:31:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "40843", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2010-2818", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40843", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40843" }, { "name": "20100804 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2010-2818", "datePublished": "2010-08-06T19:31:00Z", "dateReserved": "2010-07-23T00:00:00Z", "dateUpdated": "2024-09-17T01:36:35.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3299
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/70330 | vdb-entry, x_refsource_XF | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | vendor-advisory, x_refsource_CISCO | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sunrpc-inspection-engine-dos(70330)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sunrpc-inspection-engine-dos(70330)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3299", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "cisco-sunrpc-inspection-engine-dos(70330)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70330" }, { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3299", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-5506
Vulnerability from cvelistv5
Published
2013-10-13 10:00
Modified
2024-09-17 00:26
Severity ?
EPSS score ?
Summary
The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context's configuration via unspecified commands, aka Bug ID CSCue46080.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:15:20.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20131009 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context\u0027s configuration via unspecified commands, aka Bug ID CSCue46080." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-13T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20131009 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-5506", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context\u0027s configuration via unspecified commands, aka Bug ID CSCue46080." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20131009 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-5506", "datePublished": "2013-10-13T10:00:00Z", "dateReserved": "2013-08-22T00:00:00Z", "dateUpdated": "2024-09-17T00:26:19.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-3300
Vulnerability from cvelistv5
Published
2011-10-06 10:00
Modified
2024-08-06 23:29
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70331 | vdb-entry, x_refsource_XF | |
http://osvdb.org/76087 | vdb-entry, x_refsource_OSVDB | |
http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-dos(70331)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331" }, { "name": "76087", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/76087" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-dos(70331)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331" }, { "name": "76087", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/76087" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-3300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20111005 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-asa.shtml" }, { "name": "cisco-fwsm-sunrpc-dos(70331)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70331" }, { "name": "76087", "refsource": "OSVDB", "url": "http://osvdb.org/76087" }, { "name": "20111005 Multiple Vulnerabilities in Cisco Firewall Services Module", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20111005-fwsm.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-3300", "datePublished": "2011-10-06T10:00:00", "dateReserved": "2011-08-29T00:00:00", "dateUpdated": "2024-08-06T23:29:56.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0394
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml | vendor-advisory, x_refsource_CISCO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65593 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id?1025108 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/46518 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2011/0494 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/43453 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/43488 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2011/0493 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1025109 | vdb-entry, x_refsource_SECTRACK | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "cisco-fwsm-sccp-dos(65593)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "46518", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46518" }, { "name": "ADV-2011-0494", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "name": "43453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43453" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "1025109", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025109" }, { "name": "20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "cisco-fwsm-sccp-dos(65593)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "46518", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46518" }, { "name": "ADV-2011-0494", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "name": "43453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43453" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "1025109", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025109" }, { "name": "20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "cisco-fwsm-sccp-dos(65593)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "name": "1025108", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025108" }, { "name": "46518", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46518" }, { "name": "ADV-2011-0494", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "name": "43453", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43453" }, { "name": "43488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "1025109", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025109" }, { "name": "20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0394", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-5508
Vulnerability from cvelistv5
Published
2013-10-13 10:00
Modified
2024-08-06 17:15
Severity ?
EPSS score ?
Summary
The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508 | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm | vendor-advisory, x_refsource_CISCO | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:15:20.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20131213 SQL*Net Inspection Engine Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508" }, { "name": "20131009 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" }, { "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-17T15:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20131213 SQL*Net Inspection Engine Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508" }, { "name": "20131009 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" }, { "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-5508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20131213 SQL*Net Inspection Engine Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5508" }, { "name": "20131009 Multiple Vulnerabilities in Cisco Firewall Services Module Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm" }, { "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-5508", "datePublished": "2013-10-13T10:00:00", "dateReserved": "2013-08-22T00:00:00", "dateUpdated": "2024-08-06T17:15:20.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }