CVE-2009-0626 (GCVE-0-2009-0626)

Vulnerability from cvelistv5 – Published: 2009-03-27 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.100Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
          },
          {
            "name": "34239",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34239"
          },
          {
            "name": "oval:org.mitre.oval:def:6919",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
          },
          {
            "name": "34438",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34438"
          },
          {
            "name": "1021896",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021896"
          },
          {
            "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
          },
          {
            "name": "ios-sslvpn-dos(49425)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
          },
          {
            "name": "ADV-2009-0851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0851"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
        },
        {
          "name": "34239",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34239"
        },
        {
          "name": "oval:org.mitre.oval:def:6919",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
        },
        {
          "name": "34438",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34438"
        },
        {
          "name": "1021896",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021896"
        },
        {
          "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
        },
        {
          "name": "ios-sslvpn-dos(49425)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
        },
        {
          "name": "ADV-2009-0851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0851"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2009-0626",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
            },
            {
              "name": "34239",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34239"
            },
            {
              "name": "oval:org.mitre.oval:def:6919",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919"
            },
            {
              "name": "34438",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34438"
            },
            {
              "name": "1021896",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021896"
            },
            {
              "name": "20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml"
            },
            {
              "name": "ios-sslvpn-dos(49425)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49425"
            },
            {
              "name": "ADV-2009-0851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0851"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2009-0626",
    "datePublished": "2009-03-27T16:00:00",
    "dateReserved": "2009-02-18T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.100Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0668C45B-9D25-424B-B876-C1721BFFE5DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"292F6F99-19B3-4106-A432-5DE916CCDD56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40183EF8-BD19-49AD-9E55-7FCCA635327F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8E40D5D-F46E-4098-A46A-1A52A343310D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D73E5138-016A-48EC-A367-3D3285AAFED2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C114F1A6-5DFE-408F-B83A-E8B9D4AF9791\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CD5C082-9730-466D-A4A8-E4EEE5F3730D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CF419BD-8474-4F33-9CDD-587E341ABA8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"332B0446-4D8B-414B-B572-84B45D5643AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D40FB896-E20C-46B1-BF59-FBB42295F9C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0C3B413-76F7-413B-A51F-29834F9DE722\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B418CFDD-AF36-46F9-B347-B34E72100F95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9F12741-69FB-46DD-A670-8461492B338A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EC2D158-6174-4AE8-83DA-125B072B6980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68FC4904-1F4D-4E10-AF95-911B07827598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86B9E611-3F06-424C-96EF-EE4997C70AB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98FE195E-084B-4F4C-800D-850165DED48C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB74F350-37F8-48DF-924E-415E51932163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E618BF54-56DC-40FC-A515-3BFB4366F823\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1976E53-85A6-494F-B8AC-847E7988850C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A668D08-14C4-4438-A59C-CE60498BEF8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"520304A4-EB15-42A8-A402-8251A4D2076D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA88C064-898F-4C0D-A266-D7B3509C28A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"139B1182-61A3-4F3D-9E29-758F27917646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CC3706F-B00A-405E-917E-7FD5217E0501\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2595DCBA-E6F2-4551-A804-4DBB137F076B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1938D118-C07F-4BEC-8030-947F099BFCB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EB2B390-A39F-4082-BBCB-712BDD95886D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F782741-0F18-4FBC-9D00-AAABB8BC6A10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACB11851-BCF8-485B-91F9-6A39B2354826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DFE3FC0-79BC-4549-98BA-235A53719F82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4691CEAD-47F1-4A97-84A4-72B794D3F714\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4A28452-000C-4BBB-A34E-1AA63D69925D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2222EED-6CB2-4D18-8AF5-FAE55BC6213F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7414D32-88A1-416E-A717-3F47B6D1BE74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"370DC543-AC01-4B91-88C7-60C323E35929\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D1CD80F-E898-41CE-8A86-28C2F48B928A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF610051-1638-4C1B-9864-11E34EFC4DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78260223-50C0-48F8-9A65-AE67489E602C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18E39462-4CEE-4C29-8B60-50E05FCF3E91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FF16123-CCA0-4ECD-9B8C-AC1534C3F244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC7454AF-7610-4CD3-BD2B-95A6C3283811\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB633E6C-025C-4B31-ABE7-8318C813376B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"883FA166-2973-42BA-842D-28FBDBFEAC4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4362045B-7065-4FF9-A977-B3DA7894F831\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC27E79D-6B4B-4839-9664-DFE821C45C2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4963A243-74FA-43AD-9645-C9FAD527A6E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31C6EACA-35BE-4032-93DA-5F738AEE0F4A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados.\"}]",
      "id": "CVE-2009-0626",
      "lastModified": "2024-11-21T01:00:33.130",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2009-03-27T16:30:01.953",
      "references": "[{\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021896\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34239\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/34438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1021896\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0851\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-0626\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2009-03-27T16:30:01.953\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad SSLVPN en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio o cuelgue del dispositivo) mediante paquetes HTTPS manipulados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0668C45B-9D25-424B-B876-C1721BFFE5DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"292F6F99-19B3-4106-A432-5DE916CCDD56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40183EF8-BD19-49AD-9E55-7FCCA635327F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E40D5D-F46E-4098-A46A-1A52A343310D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D73E5138-016A-48EC-A367-3D3285AAFED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C114F1A6-5DFE-408F-B83A-E8B9D4AF9791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD5C082-9730-466D-A4A8-E4EEE5F3730D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF419BD-8474-4F33-9CDD-587E341ABA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332B0446-4D8B-414B-B572-84B45D5643AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40FB896-E20C-46B1-BF59-FBB42295F9C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C3B413-76F7-413B-A51F-29834F9DE722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B418CFDD-AF36-46F9-B347-B34E72100F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9F12741-69FB-46DD-A670-8461492B338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC2D158-6174-4AE8-83DA-125B072B6980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FC4904-1F4D-4E10-AF95-911B07827598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B9E611-3F06-424C-96EF-EE4997C70AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FE195E-084B-4F4C-800D-850165DED48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB74F350-37F8-48DF-924E-415E51932163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E618BF54-56DC-40FC-A515-3BFB4366F823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1976E53-85A6-494F-B8AC-847E7988850C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A668D08-14C4-4438-A59C-CE60498BEF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520304A4-EB15-42A8-A402-8251A4D2076D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139B1182-61A3-4F3D-9E29-758F27917646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC3706F-B00A-405E-917E-7FD5217E0501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595DCBA-E6F2-4551-A804-4DBB137F076B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1938D118-C07F-4BEC-8030-947F099BFCB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB2B390-A39F-4082-BBCB-712BDD95886D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F782741-0F18-4FBC-9D00-AAABB8BC6A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB11851-BCF8-485B-91F9-6A39B2354826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DFE3FC0-79BC-4549-98BA-235A53719F82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4691CEAD-47F1-4A97-84A4-72B794D3F714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A28452-000C-4BBB-A34E-1AA63D69925D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2222EED-6CB2-4D18-8AF5-FAE55BC6213F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7414D32-88A1-416E-A717-3F47B6D1BE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DC543-AC01-4B91-88C7-60C323E35929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1CD80F-E898-41CE-8A86-28C2F48B928A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF610051-1638-4C1B-9864-11E34EFC4DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78260223-50C0-48F8-9A65-AE67489E602C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E39462-4CEE-4C29-8B60-50E05FCF3E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF16123-CCA0-4ECD-9B8C-AC1534C3F244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7454AF-7610-4CD3-BD2B-95A6C3283811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB633E6C-025C-4B31-ABE7-8318C813376B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA9218D-E7A5-4F98-83E7-2FD6E138D5CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"883FA166-2973-42BA-842D-28FBDBFEAC4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4362045B-7065-4FF9-A977-B3DA7894F831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC27E79D-6B4B-4839-9664-DFE821C45C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4963A243-74FA-43AD-9645-C9FAD527A6E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C6EACA-35BE-4032-93DA-5F738AEE0F4A\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021896\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34239\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://secunia.com/advisories/34438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1021896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…