FKIE_CVE-2013-1241
Vulnerability from fkie_nvd - Published: 2013-05-08 12:09 - Updated: 2025-04-11 00:51
Severity ?
Summary
The ISM module in Cisco IOS on ISR G2 routers does not properly handle authentication-header packets, which allows remote authenticated users to cause a denial of service (module reload) via a series of malformed packets, aka Bug ID CSCub92025.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2147DBF8-B733-4F76-90C5-9D94F1E93625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9222CA59-F4FD-478D-83C9-566B389140B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:2901_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3EA062-2C68-49C8-BFE3-BB7B59EE00BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:2911_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4521999-53C8-4245-BE23-9EA9CBCDEE21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:2921_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1773D4FE-5416-4A87-BF1C-F1BDF0E8D5C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:2951_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9185EDA0-2983-4E00-8985-5E76415DF427",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:3925_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83C34A26-E6E2-4651-822D-74F642D7A8FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:3925e_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "096C701F-8203-41FB-82DC-BB5C9263A292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:3945_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94332BC5-DD19-4422-B4E3-21D6E2BCA367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:3945e_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB8466AE-B885-40BA-ADB8-C1058D95129C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E109E908-78B9-44ED-8719-B057057C2185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:867_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7E6C9E-326B-42EF-86D4-4FB2C13E2BA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:880_3g_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2F1852-8ADC-42E0-8D05-961A733523D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:881_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB6E8CC-89B8-490A-BFCF-FA9D55543B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:886_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCEBDDE6-0EA0-4C2B-9A04-87236312A269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7C5306-B810-4036-A241-7178F48ABE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5413C7E7-F55C-4158-ABDF-2D8844B96680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:887_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEFD38B2-348F-4EF2-A9B7-40A9AA5FF511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:887v_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F9EA2E-9EE7-4F68-9765-C78F85624F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3945CCD-E6F5-412D-9935-160BCD664B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C23393-F7BB-4BA9-81A5-C298D84EBF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E984A1EA-728A-4663-8494-1787AB5D93C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "526558F9-C72D-4DDA-B0DF-CAF7B97E30C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53AFBDFF-3D83-4685-82EE-A9EA4DC09241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:c881w_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F508C7A1-F13A-4244-888B-5E05F750063D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ISM module in Cisco IOS on ISR G2 routers does not properly handle authentication-header packets, which allows remote authenticated users to cause a denial of service (module reload) via a series of malformed packets, aka Bug ID CSCub92025."
},
{
"lang": "es",
"value": "El m\u00f3dulo ISM en Cisco IOS de los routers ISR G2 no controla correctamente la autenticaci\u00f3n de cabecera de los paquetes, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (recarga del m\u00f3dulo) a trav\u00e9s de una serie de paquetes malformados, tambi\u00e9n conocido como Bug ID CSCub92025."
}
],
"id": "CVE-2013-1241",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-05-08T12:09:33.697",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1241"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1241"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…