VAR-199903-0037
Vulnerability from variot - Updated: 2023-12-18 12:47Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. Cisco Catalyst is a widely used switch product developed by Cisco.
A remote attacker may connect to the TCP 7161 port of the affected switch, causing the management module to reload. At this time, the switch will not forward the packet. Although the switch can automatically recover and forward the packet afterwards, the attacker can continue to attack and form Denial of service attack
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-199903-0037",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "catalyst 29xx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1.5"
},
{
"model": "catalyst 29xx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1.502"
},
{
"model": "catalyst 5xxx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1.502"
},
{
"model": "catalyst 29xx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.0"
},
{
"model": "catalyst 5xxx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1.5"
},
{
"model": "catalyst 29xx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1.501"
},
{
"model": "catalyst 5xxx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.0"
},
{
"model": "catalyst 5xxx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1.501"
},
{
"model": "catalyst 12xx supervisor software",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "4.29"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 12xx supervisor",
"version": "4.29"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 29xx supervisor",
"version": "1.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 29xx supervisor",
"version": "2.1.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 29xx supervisor",
"version": "2.1.501"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 29xx supervisor",
"version": "2.1.502"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 5xxx supervisor",
"version": "1.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 5xxx supervisor",
"version": "2.1.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 5xxx supervisor",
"version": "2.1.501"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "catalyst 5xxx supervisor",
"version": "2.1.502"
}
],
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-1999-0430"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
],
"trust": 0.6
},
"cve": "CVE-1999-0430",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-430",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-1999-0430",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-199903-011",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-430",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-430"
},
{
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. Cisco Catalyst is a widely used switch product developed by Cisco. \n\n\u00a0A remote attacker may connect to the TCP 7161 port of the affected switch, causing the management module to reload. At this time, the switch will not forward the packet. Although the switch can automatically recover and forward the packet afterwards, the attacker can continue to attack and form Denial of service attack",
"sources": [
{
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-430"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-1999-0430",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "1103",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-1999-0447",
"trust": 0.8
},
{
"db": "IVD",
"id": "193B08E6-23CF-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-430",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"db": "VULHUB",
"id": "VHN-430"
},
{
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"id": "VAR-199903-0037",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"db": "VULHUB",
"id": "VHN-430"
}
],
"trust": 0.09
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
}
]
},
"last_update_date": "2023-12-18T12:47:42.832000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-1999-0430"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.osvdb.org/1103"
},
{
"trust": 0.1,
"url": ""
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-430"
},
{
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"db": "VULHUB",
"id": "VHN-430"
},
{
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "1999-01-01T00:00:00",
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"date": "1999-01-01T00:00:00",
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"date": "1999-03-01T00:00:00",
"db": "VULHUB",
"id": "VHN-430"
},
{
"date": "1999-03-01T05:00:00",
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"date": "1997-12-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "1999-01-01T00:00:00",
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"date": "2008-09-09T00:00:00",
"db": "VULHUB",
"id": "VHN-430"
},
{
"date": "2008-09-09T12:34:31.680000",
"db": "NVD",
"id": "CVE-1999-0430"
},
{
"date": "2005-05-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Catalyst Switch Remote Denial of Service Attack Vulnerability",
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-1999-0447"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "unknown",
"sources": [
{
"db": "IVD",
"id": "193b08e6-23cf-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-199903-011"
}
],
"trust": 0.8
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…