Vulnerabilites related to cisco - router_2500
Vulnerability from fkie_nvd
Published
2000-05-03 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
Impacted products
Vendor Product Version
cisco ios 9.14
cisco ios 11.1
cisco ios 11.1\(13\)
cisco ios 11.1\(13\)aa
cisco ios 11.1\(13\)ca
cisco ios 11.1\(13\)ia
cisco ios 11.1\(15\)ca
cisco ios 11.1\(16\)
cisco ios 11.1\(16\)aa
cisco ios 11.1\(16\)ia
cisco ios 11.1\(17\)cc
cisco ios 11.1\(17\)ct
cisco ios 11.2
cisco ios 11.2\(4\)f1
cisco ios 11.2\(8\)
cisco ios 11.2\(8\)p
cisco ios 11.2\(8\)sa1
cisco ios 11.2\(8\)sa3
cisco ios 11.2\(8\)sa5
cisco ios 11.2\(9\)p
cisco ios 11.2\(9\)xa
cisco ios 11.2\(10\)
cisco ios 11.2\(10\)bc
cisco ios 11.2\(17\)
cisco ios 11.2p
cisco ios 12.0
cisco ios 12.0\(1\)w
cisco ios 12.0\(1\)xa3
cisco ios 12.0\(1\)xb
cisco ios 12.0\(1\)xe
cisco ios 12.0\(2\)
cisco ios 12.0\(2\)xc
cisco ios 12.0\(2\)xd
cisco ios 12.0\(2\)xf
cisco ios 12.0\(2\)xg
cisco ios 12.0\(3\)t2
cisco ios 12.0\(4\)
cisco ios 12.0\(4\)s
cisco ios 12.0\(4\)t
cisco ios 12.0\(5\)
cisco ios 12.0\(5\)t1
cisco ios 12.0\(6\)
cisco ios 12.0\(7\)t
cisco ios 12.0\(8\)
cisco ios 12.0\(9\)s
cisco ios 12.0db
cisco ios 12.0s
cisco ios 12.0t
cisco router_2500 *
cisco router_2600 *
cisco router_3600 *
cisco router_4000 *
cisco router_7200 *
cisco router_7500 *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "327028C0-D9F3-46A3-B2CC-4630FE18C43E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B6315D-7BEF-419F-9B93-3CF669E986D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B36FF40E-EF0A-4149-A35D-8D765EBFFAE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*",
                     matchCriteriaId: "51382DA5-4EBC-44DC-951F-32FC7AA719A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BA2A1FD-11A3-403A-B5A6-0220CA18EC99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*",
                     matchCriteriaId: "3493F361-0C8A-4B66-AF6B-926E2D66BBEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*",
                     matchCriteriaId: "841513AE-7521-4670-8438-AE5EB70F3A48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FF3E8F79-6177-453C-99B5-BC9BC7670869",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B244655-A6A5-40D0-A0D1-34C814DA9389",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA064273-1A6E-4303-BAAB-F585691EF9BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8158E2-0DFE-479B-B085-9775FF700C85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*",
                     matchCriteriaId: "29CA3070-B75D-4E56-A338-E10F5509394E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8026B11-6144-467F-8094-F4F73CD37526",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*",
                     matchCriteriaId: "17DE2319-19D9-4C02-80B4-0A6AAD853867",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "82BFEABB-6E90-4A24-BBE3-2BDB524028A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*",
                     matchCriteriaId: "F169E322-3D72-4F86-BD5F-74589E5DD823",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA5D334-6DB8-44B0-92EF-8694BBE79A9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*",
                     matchCriteriaId: "099CFED1-0E2F-46B2-8136-BFA146EB9A00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*",
                     matchCriteriaId: "754F06BF-EB7D-4DAD-BF5D-7DF2619A7499",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*",
                     matchCriteriaId: "047F9781-38B8-488C-B999-A3CA6BDB639C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3586C0-64AF-4584-8F56-7E0756B4A521",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9B784C9F-79EE-4D08-9D03-985EC7E378FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F86F790-6247-42F2-9487-3D60A2842F52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
                     matchCriteriaId: "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE210B04-7ECD-419C-9258-0F619A353A8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B467741-B277-4128-9804-E13ED23FD310",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "77DDC99D-8B73-452C-94A7-A9A48F2F379B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
                     matchCriteriaId: "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48466C4-5A1E-4C71-8822-32D387B36B8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E23131-D207-4D98-96D5-2B71FF792604",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7109585-1433-4940-B7C9-C561DEAF1498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A0D82E1-CCF7-429B-A637-479E839EAE3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F1B2747-4A9C-44FC-BBA8-39E338B30417",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D5BB7513-C232-4B4F-BE68-972B05086ABD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA263B60-E7C0-4374-96DF-6E4EB9C16743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCE69A3-41C6-4893-86D4-7F264352C8A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA654CE6-82C3-43D0-BAED-70E88A740BF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "387FCCC1-B05D-4493-9F05-BAC5A0E57F15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C398460-3F38-4AA7-A4B1-FD8A01588DB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7F94E8-86FC-456B-A7BB-57953F67F754",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:router_2500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "317EF7FA-B744-487C-AEB6-4516CF03F9B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:router_2600:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3B03AEF-EACD-4B3D-AA1E-EADC344C02BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:router_3600:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0460513-094F-4F99-B0EB-7AA484D21920",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:router_4000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "446980C5-E512-475C-B255-86A8726A67D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "637F3047-DF5B-481D-8595-B54B076A5CD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:router_7500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7F3C4B-378B-4431-B4AF-09D95354363E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command.",
      },
   ],
   id: "CVE-2000-0345",
   lastModified: "2024-11-20T23:32:17.483",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2000-05-03T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/1161",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/1161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2000-0345
Vulnerability from cvelistv5
Published
2000-05-18 04:00
Modified
2024-08-08 05:14
Severity ?
Summary
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:14:21.235Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1161",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/1161",
               },
               {
                  name: "20000502 Possible issue with Cisco on-line help?",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-05-02T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2003-03-21T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1161",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/1161",
            },
            {
               name: "20000502 Possible issue with Cisco on-line help?",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-0345",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1161",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/1161",
                  },
                  {
                     name: "20000502 Possible issue with Cisco on-line help?",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail@securityfocus.com",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-0345",
      datePublished: "2000-05-18T04:00:00",
      dateReserved: "2000-05-11T00:00:00",
      dateUpdated: "2024-08-08T05:14:21.235Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}