Vulnerabilites related to cisco - router_2500
Vulnerability from fkie_nvd
Published
2000-05-03 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 9.14 | |
cisco | ios | 11.1 | |
cisco | ios | 11.1\(13\) | |
cisco | ios | 11.1\(13\)aa | |
cisco | ios | 11.1\(13\)ca | |
cisco | ios | 11.1\(13\)ia | |
cisco | ios | 11.1\(15\)ca | |
cisco | ios | 11.1\(16\) | |
cisco | ios | 11.1\(16\)aa | |
cisco | ios | 11.1\(16\)ia | |
cisco | ios | 11.1\(17\)cc | |
cisco | ios | 11.1\(17\)ct | |
cisco | ios | 11.2 | |
cisco | ios | 11.2\(4\)f1 | |
cisco | ios | 11.2\(8\) | |
cisco | ios | 11.2\(8\)p | |
cisco | ios | 11.2\(8\)sa1 | |
cisco | ios | 11.2\(8\)sa3 | |
cisco | ios | 11.2\(8\)sa5 | |
cisco | ios | 11.2\(9\)p | |
cisco | ios | 11.2\(9\)xa | |
cisco | ios | 11.2\(10\) | |
cisco | ios | 11.2\(10\)bc | |
cisco | ios | 11.2\(17\) | |
cisco | ios | 11.2p | |
cisco | ios | 12.0 | |
cisco | ios | 12.0\(1\)w | |
cisco | ios | 12.0\(1\)xa3 | |
cisco | ios | 12.0\(1\)xb | |
cisco | ios | 12.0\(1\)xe | |
cisco | ios | 12.0\(2\) | |
cisco | ios | 12.0\(2\)xc | |
cisco | ios | 12.0\(2\)xd | |
cisco | ios | 12.0\(2\)xf | |
cisco | ios | 12.0\(2\)xg | |
cisco | ios | 12.0\(3\)t2 | |
cisco | ios | 12.0\(4\) | |
cisco | ios | 12.0\(4\)s | |
cisco | ios | 12.0\(4\)t | |
cisco | ios | 12.0\(5\) | |
cisco | ios | 12.0\(5\)t1 | |
cisco | ios | 12.0\(6\) | |
cisco | ios | 12.0\(7\)t | |
cisco | ios | 12.0\(8\) | |
cisco | ios | 12.0\(9\)s | |
cisco | ios | 12.0db | |
cisco | ios | 12.0s | |
cisco | ios | 12.0t | |
cisco | router_2500 | * | |
cisco | router_2600 | * | |
cisco | router_3600 | * | |
cisco | router_4000 | * | |
cisco | router_7200 | * | |
cisco | router_7500 | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*", matchCriteriaId: "327028C0-D9F3-46A3-B2CC-4630FE18C43E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", matchCriteriaId: "82B6315D-7BEF-419F-9B93-3CF669E986D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*", matchCriteriaId: "B36FF40E-EF0A-4149-A35D-8D765EBFFAE2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "51382DA5-4EBC-44DC-951F-32FC7AA719A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*", matchCriteriaId: "5BA2A1FD-11A3-403A-B5A6-0220CA18EC99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "3493F361-0C8A-4B66-AF6B-926E2D66BBEE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*", matchCriteriaId: "841513AE-7521-4670-8438-AE5EB70F3A48", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*", matchCriteriaId: "FF3E8F79-6177-453C-99B5-BC9BC7670869", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "4B244655-A6A5-40D0-A0D1-34C814DA9389", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "CA064273-1A6E-4303-BAAB-F585691EF9BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*", matchCriteriaId: "0A8158E2-0DFE-479B-B085-9775FF700C85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*", matchCriteriaId: "29CA3070-B75D-4E56-A338-E10F5509394E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", matchCriteriaId: "E8026B11-6144-467F-8094-F4F73CD37526", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*", matchCriteriaId: "17DE2319-19D9-4C02-80B4-0A6AAD853867", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", matchCriteriaId: "82BFEABB-6E90-4A24-BBE3-2BDB524028A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*", matchCriteriaId: "F169E322-3D72-4F86-BD5F-74589E5DD823", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*", matchCriteriaId: "DBA5D334-6DB8-44B0-92EF-8694BBE79A9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*", matchCriteriaId: "099CFED1-0E2F-46B2-8136-BFA146EB9A00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*", matchCriteriaId: "754F06BF-EB7D-4DAD-BF5D-7DF2619A7499", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*", matchCriteriaId: "047F9781-38B8-488C-B999-A3CA6BDB639C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "3E3586C0-64AF-4584-8F56-7E0756B4A521", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", matchCriteriaId: "9B784C9F-79EE-4D08-9D03-985EC7E378FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*", matchCriteriaId: "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*", matchCriteriaId: "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", matchCriteriaId: "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", matchCriteriaId: "8F86F790-6247-42F2-9487-3D60A2842F52", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", matchCriteriaId: "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", matchCriteriaId: "AE210B04-7ECD-419C-9258-0F619A353A8A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", matchCriteriaId: "3B467741-B277-4128-9804-E13ED23FD310", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", matchCriteriaId: "77DDC99D-8B73-452C-94A7-A9A48F2F379B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", matchCriteriaId: "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", matchCriteriaId: "C48466C4-5A1E-4C71-8822-32D387B36B8B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", matchCriteriaId: "08E23131-D207-4D98-96D5-2B71FF792604", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", matchCriteriaId: "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "E7109585-1433-4940-B7C9-C561DEAF1498", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", matchCriteriaId: "1A0D82E1-CCF7-429B-A637-479E839EAE3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", matchCriteriaId: "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "4F1B2747-4A9C-44FC-BBA8-39E338B30417", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "D5BB7513-C232-4B4F-BE68-972B05086ABD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "EA263B60-E7C0-4374-96DF-6E4EB9C16743", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", matchCriteriaId: "ECCE69A3-41C6-4893-86D4-7F264352C8A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", matchCriteriaId: "FA654CE6-82C3-43D0-BAED-70E88A740BF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", matchCriteriaId: "387FCCC1-B05D-4493-9F05-BAC5A0E57F15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", matchCriteriaId: "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", matchCriteriaId: "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", matchCriteriaId: "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", matchCriteriaId: "CA7F94E8-86FC-456B-A7BB-57953F67F754", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:router_2500:*:*:*:*:*:*:*:*", matchCriteriaId: "317EF7FA-B744-487C-AEB6-4516CF03F9B3", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:router_2600:*:*:*:*:*:*:*:*", matchCriteriaId: "C3B03AEF-EACD-4B3D-AA1E-EADC344C02BE", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:router_3600:*:*:*:*:*:*:*:*", matchCriteriaId: "B0460513-094F-4F99-B0EB-7AA484D21920", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:router_4000:*:*:*:*:*:*:*:*", matchCriteriaId: "446980C5-E512-475C-B255-86A8726A67D2", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*", matchCriteriaId: "637F3047-DF5B-481D-8595-B54B076A5CD7", vulnerable: true, }, { criteria: "cpe:2.3:h:cisco:router_7500:*:*:*:*:*:*:*:*", matchCriteriaId: "CA7F3C4B-378B-4431-B4AF-09D95354363E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command.", }, ], id: "CVE-2000-0345", lastModified: "2024-11-20T23:32:17.483", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2000-05-03T04:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/1161", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/1161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2000-0345
Vulnerability from cvelistv5
Published
2000-05-18 04:00
Modified
2024-08-08 05:14
Severity ?
EPSS score ?
Summary
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1161 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com | mailing-list, x_refsource_BUGTRAQ |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T05:14:21.235Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1161", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/1161", }, { name: "20000502 Possible issue with Cisco on-line help?", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2000-05-02T00:00:00", descriptions: [ { lang: "en", value: "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2003-03-21T10:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1161", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/1161", }, { name: "20000502 Possible issue with Cisco on-line help?", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2000-0345", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1161", refsource: "BID", url: "http://www.securityfocus.com/bid/1161", }, { name: "20000502 Possible issue with Cisco on-line help?", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail@securityfocus.com", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2000-0345", datePublished: "2000-05-18T04:00:00", dateReserved: "2000-05-11T00:00:00", dateUpdated: "2024-08-08T05:14:21.235Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }