Vulnerabilites related to cisco - 871_integrated_services_router
cve-2008-4128
Vulnerability from cvelistv5
Published
2008-09-18 20:00
Modified
2024-08-07 10:08
Severity ?
EPSS score ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain "show privilege" command to the /level/15/exec/- URI, and (2) a certain "alias exec" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/6476 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45226 | vdb-entry, x_refsource_XF | |
http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/6477 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/31218 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T10:08:34.051Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "6476", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/6476", }, { name: "cisco-router-csrf(45226)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/45226", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html", }, { name: "6477", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/6477", }, { name: "31218", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/31218", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-09-17T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain \"show privilege\" command to the /level/15/exec/- URI, and (2) a certain \"alias exec\" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "6476", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/6476", }, { name: "cisco-router-csrf(45226)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/45226", }, { tags: [ "x_refsource_MISC", ], url: "http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html", }, { name: "6477", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/6477", }, { name: "31218", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/31218", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-4128", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain \"show privilege\" command to the /level/15/exec/- URI, and (2) a certain \"alias exec\" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "6476", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/6476", }, { name: "cisco-router-csrf(45226)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/45226", }, { name: "http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html", refsource: "MISC", url: "http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html", }, { name: "6477", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/6477", }, { name: "31218", refsource: "BID", url: "http://www.securityfocus.com/bid/31218", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-4128", datePublished: "2008-09-18T20:00:00", dateReserved: "2008-09-18T00:00:00", dateUpdated: "2024-08-07T10:08:34.051Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12232
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-11-15 17:58
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039452 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101044 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.692Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101044", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12232", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:34:20.447301Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12232", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:58:04.978Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS", }, ], }, ], datePublic: "2017-09-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-29T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101044", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12232", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "Cisco IOS", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", refsource: "BID", url: "http://www.securityfocus.com/bid/101044", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12232", datePublished: "2017-09-28T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-11-15T17:58:04.978Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2008-09-18 20:00
Modified
2024-11-21 00:50
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain "show privilege" command to the /level/15/exec/- URI, and (2) a certain "alias exec" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.4 | |
cisco | 871_integrated_services_router | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", matchCriteriaId: "9D4D8C72-E7BB-40BF-9AE5-622794D63E09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:871_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F1A300FE-D6D3-41AC-9792-4D0E28621F72", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain \"show privilege\" command to the /level/15/exec/- URI, and (2) a certain \"alias exec\" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.", }, { lang: "es", value: "Vulnerabilidad múltiple de falsificación de petición en sitios cruzados - CSRF en el componente de administración HTTP en el IOS Cisco 12.4 en el Router de Servicios Integrados 871, que permite a los atacantes remotos ejecutar arbitrariamente comandos a través de(1) ciertos comandos que \"muestran lo privilegios\" en /level/15/exec/- URI, y (2) ciertos comandos \"alias exec\" en /level/15/exec/-/configure/http URI. NOTA: algunos de estos detalles fueron obtenidos de información de terceros.", }, ], id: "CVE-2008-4128", lastModified: "2024-11-21T00:50:57.967", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2008-09-18T20:00:00.530", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/31218", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/45226", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/6476", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/6477", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://jbrownsec.blogspot.com/2008/09/cisco-0day-released.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/31218", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/45226", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/6476", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/6477", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-29 01:34
Modified
2025-01-27 19:23
Severity ?
Summary
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101044 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039452 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101044 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039452 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-24", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS Software for Cisco Integrated Services Routers Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "650EB42C-D85F-482B-972D-7DCAC210DC48", versionEndIncluding: "15.6", versionStartIncluding: "15.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "398D63B0-F15B-409B-AFBC-DE6C94FAF815", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D05CC9-8D04-4DE0-A854-375192B4D46C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9030977A-7753-4ED5-A082-4B2F5749D37D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:860vae-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "4C9C511D-7D5E-4758-A335-70019EBD9F8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E109E908-78B9-44ED-8719-B057057C2185", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:861w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "31F8D515-3D54-459F-8CE7-FFA91439C0D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:866vae_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "510B60EF-AA4D-469F-8EEF-133F354DDF55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:867_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EF7E6C9E-326B-42EF-86D4-4FB2C13E2BA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:867vae_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8D562373-BD3F-4690-928F-9FE0325A3379", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:871_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F1A300FE-D6D3-41AC-9792-4D0E28621F72", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:880-voice_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62165B-6CA9-4DD8-8A36-B658F61FF9EF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:880_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2F1852-8ADC-42E0-8D05-961A733523D1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DA5ACE25-8C18-49B0-AFFC-17CB30F61930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB6E4CF5-D944-4281-94E5-72BC5437BC62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CFB6E8CC-89B8-490A-BFCF-FA9D55543B21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "480629DC-DA23-4A9E-B90F-E8AB894C9353", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BCEBDDE6-0EA0-4C2B-9A04-87236312A269", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "4D3EA60A-1BA9-43E8-AF81-914846C26CC1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "FA7C5306-B810-4036-A241-7178F48ABE8E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5413C7E7-F55C-4158-ABDF-2D8844B96680", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6745ADF-DCE3-42C3-A548-F9E44AEE88CC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "FEFD38B2-348F-4EF2-A9B7-40A9AA5FF511", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887v_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F9EA2E-9EE7-4F68-9765-C78F85624F2D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1563AC8D-4E4D-4126-8C5D-84B449AAEF57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3945CCD-E6F5-412D-9935-160BCD664B10", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B0C23393-F7BB-4BA9-81A5-C298D84EBF0B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "61B623C2-D81B-430B-9FD2-E2764EE94809", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vam-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "828E07F6-1E92-4990-AEBC-DBFE4B5B2DE4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vamg_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "08B77C60-06E0-47FF-8CD4-35FE5C60FF95", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7E97DA13-D485-42BE-A0E9-F40A0C823735", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E984A1EA-728A-4663-8494-1787AB5D93C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888e-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "35D9B6C7-A707-41CD-953F-5773FB3F7685", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "716E154A-5586-4F58-8203-EC8256E00BAD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888eg_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7CC0F79A-52CA-46A6-9C6A-0596718053E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8054E665-E4DA-4453-A34B-830B69D273A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891-24x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BEA480B3-25E2-4B05-9F46-417B696789B4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "526558F9-C72D-4DDA-B0DF-CAF7B97E30C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B4B9D069-85C0-4299-BCAF-441A2D6227BF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "53AFBDFF-3D83-4685-82EE-A9EA4DC09241", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892f-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB4AF464-B247-40CF-A2B5-1B278303418B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D674C533-304A-42A4-97EE-1CA39908E888", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000_:-:*:*:*:*:*:*:*", matchCriteriaId: "0ABA6B44-E3FB-4B9C-8148-D9F10E617DB8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, { lang: "es", value: "Una vulnerabilidad en la implementación de un protocolo en los routers Cisco Integrated Services Routers Generation 2 (ISR G2) que ejecuten Cisco IOS desde la versión 15.0 hasta la 15.6 podría permitir que un atacante adyacente sin autenticar haga que el dispositivo afectado se reinicie, provocando una denegación de servicio (DoS) en consecuencia. Esta vulnerabilidad se debe a una clasificación incorrecta de los frames Ethernet. Un atacante podría explotar esta vulnerabilidad enviando un frame Ethernet al dispositivo afectado. Si se explota con éxito, podría permitir que el atacante provoque que el dispositivo afectado se reinicie, provocando una denegación de servicio. Cisco Bug IDs: CSCvc03809.", }, ], id: "CVE-2017-12232", lastModified: "2025-01-27T19:23:29.077", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-29T01:34:48.780", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101044", }, { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039452", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039452", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }