VAR-201305-0113
Vulnerability from variot - Updated: 2023-12-18 12:30Cisco TelePresence Supervisor MSE 8050 before 2.3(1.31) allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing TCP connections at a high rate, aka Bug IDs CSCuf76076 and CSCuf79763. Successfully exploiting this issue may allow an attacker to cause high CPU utilization and reload of the affected system resulting in denial of service conditions. This issue is being tracked by Cisco Bug IDs CSCuf76076 and CSCuf79763
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201305-0113",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "telepresence supervisor mse 8050 software",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "2.2\\(1.17\\)"
},
{
"model": "telepresence supervisor mse 8050",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence supervisor mse 8050",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "telepresence supervisor mse 8050 software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "2.3(1.31)"
},
{
"model": "telepresence supervisor mse 8050 software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "2.2\\(1.17\\)"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:telepresence_supervisor_mse_8050_software:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.2\\(1.17\\)",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:telepresence_supervisor_mse_8050:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-1236"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "59879"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
],
"trust": 0.9
},
"cve": "CVE-2013-1236",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2013-1236",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-61238",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-1236",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201305-303",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-61238",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61238"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco TelePresence Supervisor MSE 8050 before 2.3(1.31) allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing TCP connections at a high rate, aka Bug IDs CSCuf76076 and CSCuf79763. \nSuccessfully exploiting this issue may allow an attacker to cause high CPU utilization and reload of the affected system resulting in denial of service conditions. \nThis issue is being tracked by Cisco Bug IDs CSCuf76076 and CSCuf79763",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "BID",
"id": "59879"
},
{
"db": "VULHUB",
"id": "VHN-61238"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-1236",
"trust": 2.8
},
{
"db": "BID",
"id": "59879",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303",
"trust": 0.7
},
{
"db": "CISCO",
"id": "20130515 CISCO TELEPRESENCE SUPERVISOR MSE 8050 DENIAL OF SERVICE VULNERABILITY",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "23707",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-61238",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61238"
},
{
"db": "BID",
"id": "59879"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"id": "VAR-201305-0113",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-61238"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:30:57.174000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20130515-mse",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130515-mse"
},
{
"title": "29262",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29262"
},
{
"title": "cisco-sa-20130515-mse",
"trust": 0.8,
"url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118113_cisco-sa-20130515-mse-j.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61238"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "NVD",
"id": "CVE-2013-1236"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130515-mse"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1236"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1236"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/59879"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/23707"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-61238"
},
{
"db": "BID",
"id": "59879"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-61238"
},
{
"db": "BID",
"id": "59879"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-05-16T00:00:00",
"db": "VULHUB",
"id": "VHN-61238"
},
{
"date": "2013-05-15T00:00:00",
"db": "BID",
"id": "59879"
},
{
"date": "2013-05-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"date": "2013-05-16T03:36:22.727000",
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"date": "2013-05-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-05-16T00:00:00",
"db": "VULHUB",
"id": "VHN-61238"
},
{
"date": "2013-05-15T00:00:00",
"db": "BID",
"id": "59879"
},
{
"date": "2013-05-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002732"
},
{
"date": "2013-05-16T13:13:47.487000",
"db": "NVD",
"id": "CVE-2013-1236"
},
{
"date": "2013-06-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco TelePresence Supervisor MSE 8050 Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002732"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201305-303"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…