fkie_cve-2008-3809
Vulnerability from fkie_nvd
Published
2008-09-26 16:21
Modified
2025-04-09 00:30
Severity ?
Summary
Cisco IOS 12.0 through 12.4 on Gigabit Switch Router (GSR) devices (aka 12000 Series routers) allows remote attackers to cause a denial of service (device crash) via a malformed Protocol Independent Multicast (PIM) packet.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.0 | |
| cisco | ios | 12.0da | |
| cisco | ios | 12.0db | |
| cisco | ios | 12.0dc | |
| cisco | ios | 12.0sc | |
| cisco | ios | 12.0sl | |
| cisco | ios | 12.0sp | |
| cisco | ios | 12.0st | |
| cisco | ios | 12.0sx | |
| cisco | ios | 12.0t | |
| cisco | ios | 12.0w | |
| cisco | ios | 12.0wc | |
| cisco | ios | 12.0xa | |
| cisco | ios | 12.0xb | |
| cisco | ios | 12.0xc | |
| cisco | ios | 12.0xd | |
| cisco | ios | 12.0xe | |
| cisco | ios | 12.0xg | |
| cisco | ios | 12.0xh | |
| cisco | ios | 12.0xi | |
| cisco | ios | 12.0xj | |
| cisco | ios | 12.0xk | |
| cisco | ios | 12.0xl | |
| cisco | ios | 12.0xm | |
| cisco | ios | 12.0xn | |
| cisco | ios | 12.0xq | |
| cisco | ios | 12.0xr | |
| cisco | ios | 12.0xt | |
| cisco | ios | 12.0xv | |
| cisco | ios | 12.1 | |
| cisco | ios | 12.1aa | |
| cisco | ios | 12.1ax | |
| cisco | ios | 12.1ay | |
| cisco | ios | 12.1cx | |
| cisco | ios | 12.1da | |
| cisco | ios | 12.1dc | |
| cisco | ios | 12.1eb | |
| cisco | ios | 12.1ec | |
| cisco | ios | 12.1eo | |
| cisco | ios | 12.1eu | |
| cisco | ios | 12.1ew | |
| cisco | ios | 12.1ex | |
| cisco | ios | 12.1ey | |
| cisco | ios | 12.1ez | |
| cisco | ios | 12.1ga | |
| cisco | ios | 12.1gb | |
| cisco | ios | 12.1t | |
| cisco | ios | 12.1xa | |
| cisco | ios | 12.1xb | |
| cisco | ios | 12.1xc | |
| cisco | ios | 12.1xd | |
| cisco | ios | 12.1xe | |
| cisco | ios | 12.1xf | |
| cisco | ios | 12.1xg | |
| cisco | ios | 12.1xh | |
| cisco | ios | 12.1xi | |
| cisco | ios | 12.1xj | |
| cisco | ios | 12.1xl | |
| cisco | ios | 12.1xm | |
| cisco | ios | 12.1xp | |
| cisco | ios | 12.1xq | |
| cisco | ios | 12.1xr | |
| cisco | ios | 12.1xs | |
| cisco | ios | 12.1xt | |
| cisco | ios | 12.1xu | |
| cisco | ios | 12.1xv | |
| cisco | ios | 12.1xw | |
| cisco | ios | 12.1xx | |
| cisco | ios | 12.1xy | |
| cisco | ios | 12.1xz | |
| cisco | ios | 12.1ya | |
| cisco | ios | 12.1yb | |
| cisco | ios | 12.1yc | |
| cisco | ios | 12.1yd | |
| cisco | ios | 12.1ye | |
| cisco | ios | 12.1yf | |
| cisco | ios | 12.1yh | |
| cisco | ios | 12.1yi | |
| cisco | ios | 12.2b | |
| cisco | ios | 12.2bc | |
| cisco | ios | 12.2bw | |
| cisco | ios | 12.2bx | |
| cisco | ios | 12.2by | |
| cisco | ios | 12.2bz | |
| cisco | ios | 12.2cx | |
| cisco | ios | 12.2cy | |
| cisco | ios | 12.2cz | |
| cisco | ios | 12.2dd | |
| cisco | ios | 12.2dx | |
| cisco | ios | 12.2ew | |
| cisco | ios | 12.2ez | |
| cisco | ios | 12.2fz | |
| cisco | ios | 12.2ixa | |
| cisco | ios | 12.2ixb | |
| cisco | ios | 12.2ixc | |
| cisco | ios | 12.2ixd | |
| cisco | ios | 12.2mb | |
| cisco | ios | 12.2sbc | |
| cisco | ios | 12.2sea | |
| cisco | ios | 12.2seb | |
| cisco | ios | 12.2sec | |
| cisco | ios | 12.2sed | |
| cisco | ios | 12.2so | |
| cisco | ios | 12.2su | |
| cisco | ios | 12.2sx | |
| cisco | ios | 12.2sxa | |
| cisco | ios | 12.2sxb | |
| cisco | ios | 12.2sxd | |
| cisco | ios | 12.2sxe | |
| cisco | ios | 12.2sy | |
| cisco | ios | 12.2sz | |
| cisco | ios | 12.2t | |
| cisco | ios | 12.2tpc | |
| cisco | ios | 12.2xa | |
| cisco | ios | 12.2xb | |
| cisco | ios | 12.2xc | |
| cisco | ios | 12.2xd | |
| cisco | ios | 12.2xe | |
| cisco | ios | 12.2xf | |
| cisco | ios | 12.2xg | |
| cisco | ios | 12.2xh | |
| cisco | ios | 12.2xi | |
| cisco | ios | 12.2xj | |
| cisco | ios | 12.2xk | |
| cisco | ios | 12.2xl | |
| cisco | ios | 12.2xm | |
| cisco | ios | 12.2xq | |
| cisco | ios | 12.2xr | |
| cisco | ios | 12.2xs | |
| cisco | ios | 12.2xt | |
| cisco | ios | 12.2xu | |
| cisco | ios | 12.2xv | |
| cisco | ios | 12.2xw | |
| cisco | ios | 12.2ya | |
| cisco | ios | 12.2yb | |
| cisco | ios | 12.2yc | |
| cisco | ios | 12.2yd | |
| cisco | ios | 12.2ye | |
| cisco | ios | 12.2yf | |
| cisco | ios | 12.2yg | |
| cisco | ios | 12.2yh | |
| cisco | ios | 12.2yj | |
| cisco | ios | 12.2yk | |
| cisco | ios | 12.2yl | |
| cisco | ios | 12.2ym | |
| cisco | ios | 12.2yn | |
| cisco | ios | 12.2yo | |
| cisco | ios | 12.2yp | |
| cisco | ios | 12.2yq | |
| cisco | ios | 12.2yr | |
| cisco | ios | 12.2yt | |
| cisco | ios | 12.2yu | |
| cisco | ios | 12.2yv | |
| cisco | ios | 12.2yw | |
| cisco | ios | 12.2yx | |
| cisco | ios | 12.2yy | |
| cisco | ios | 12.2yz | |
| cisco | ios | 12.2za | |
| cisco | ios | 12.2zb | |
| cisco | ios | 12.2zc | |
| cisco | ios | 12.2zd | |
| cisco | ios | 12.2ze | |
| cisco | ios | 12.2zf | |
| cisco | ios | 12.2zg | |
| cisco | ios | 12.2zj | |
| cisco | ios | 12.2zl | |
| cisco | ios | 12.2zp | |
| cisco | ios | 12.2zu | |
| cisco | ios | 12.2zx | |
| cisco | ios | 12.3b | |
| cisco | ios | 12.3bw | |
| cisco | ios | 12.3t | |
| cisco | ios | 12.3tpc | |
| cisco | ios | 12.3xb | |
| cisco | ios | 12.3xc | |
| cisco | ios | 12.3xd | |
| cisco | ios | 12.3xe | |
| cisco | ios | 12.3xf | |
| cisco | ios | 12.3xg | |
| cisco | ios | 12.3xj | |
| cisco | ios | 12.3xk | |
| cisco | ios | 12.3xl | |
| cisco | ios | 12.3xq | |
| cisco | ios | 12.3xs | |
| cisco | ios | 12.3xu | |
| cisco | ios | 12.3xw | |
| cisco | ios | 12.3xy | |
| cisco | ios | 12.3xz | |
| cisco | ios | 12.3ya | |
| cisco | ios | 12.3yd | |
| cisco | ios | 12.3yf | |
| cisco | ios | 12.3yh | |
| cisco | ios | 12.3yi | |
| cisco | ios | 12.3yj | |
| cisco | ios | 12.3yk | |
| cisco | ios | 12.3yq | |
| cisco | ios | 12.3ys | |
| cisco | ios | 12.3yt | |
| cisco | ios | 12.3yu | |
| cisco | ios | 12.3za | |
| cisco | ios | 12.4xa | |
| cisco | ios | 12.4xc | |
| cisco | ios | 12.4xe | |
| cisco | ios | 12.4xp |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
"matchCriteriaId": "12434A88-88C6-4749-981F-E2B4D725F48F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
"matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6B0C2F-2FBE-4422-AD30-305100C595CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "932C1AC0-0BD1-46DF-A241-AA71BBD785BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
"matchCriteriaId": "5C11A2BE-19E7-4148-B3CC-B4956B07273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*",
"matchCriteriaId": "277BFD67-3EE3-4E79-8D81-35597D168C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B5CC91-144D-4818-871E-E6120A7E1050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
"matchCriteriaId": "1050ACB3-E5B2-4710-910B-F3DF4B49907F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
"matchCriteriaId": "7977DA9F-41DE-4482-B0CD-896EEEFB5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADAB898-7728-4C14-B69A-7B8B06AFC894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
"matchCriteriaId": "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"matchCriteriaId": "54424787-34AC-410D-985F-511ADB2BB144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
"matchCriteriaId": "70F54F0C-AC91-4CB7-9FEB-257F03547864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A0D017-F26F-4429-891E-C7E1C66B6588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"matchCriteriaId": "26FA075D-4A9E-44EE-90CF-23947C9040EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3DFAEC-4534-4A8D-9886-0723F57C7A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"matchCriteriaId": "D162976F-87A3-42BF-8C9F-A981B14F4673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
"matchCriteriaId": "43581A57-418A-4A35-ACF2-1380A8DA8A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*",
"matchCriteriaId": "F0AB67FC-88F4-42BB-BB90-54521950DE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
"matchCriteriaId": "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
"matchCriteriaId": "442972CD-50D3-4C46-AB73-44AED94B9F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
"matchCriteriaId": "19077C39-A27B-4EC3-A882-9AC826E61570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
"matchCriteriaId": "FDEF6AED-4477-4AAC-9759-1996B77DFEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
"matchCriteriaId": "C9427851-B0DC-4CE6-8BFA-60619D1DC87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3A67F5-05C6-4097-A88E-0A0F165C12EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8C5149-40F8-40C9-9FC3-7E7C68801320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
"matchCriteriaId": "B377A8B9-90F2-41B7-9098-5ABEB621E2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B15FCC-1BB3-41CA-9550-6D55DD381F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A85892-C3AB-4920-A949-A71BD0332D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
"matchCriteriaId": "C6330829-9A7B-479D-B38B-BC64148EC172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9F1E38-3482-4EAC-8654-EBC004B9344B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
"matchCriteriaId": "51BCD9C9-7E6B-42EB-A645-32B3C00CDDEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
"matchCriteriaId": "34A61768-E18E-4DB0-9EDF-2E36D0F62DF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"matchCriteriaId": "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
"matchCriteriaId": "0E488E6E-87F0-4292-B97B-31087FDB4655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"matchCriteriaId": "0D199CB1-A2A3-4678-9503-C5B61281755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"matchCriteriaId": "80E8AF76-0A1D-4BAE-BF10-D63080352E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
"matchCriteriaId": "3A273401-9394-4BC3-879C-DE3EFC09B3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"matchCriteriaId": "6DABF911-FCDF-4095-A95D-4BB73628FCA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"matchCriteriaId": "677DC4B6-8B3D-4A0D-9934-743FD7494DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E272881F-0804-4190-A21D-3D0B9A774F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"matchCriteriaId": "F084DA16-24CB-41D1-92B7-C6E0499AAD10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"matchCriteriaId": "BA979D75-F60E-45F8-B99C-1402DC8CFCDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"matchCriteriaId": "194F0AB1-92E6-4CE3-A5A1-904BF75F05D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"matchCriteriaId": "C1835410-77EB-46F2-ACF0-379759D4B0D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB103ED-B170-4193-84CD-4C59F4D6A10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
"matchCriteriaId": "F88DCCDE-6A81-473F-B4FE-95A84F8DF964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"matchCriteriaId": "63D55886-268F-4E4D-B00F-8A5D97A73BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "E314B0F7-1A27-483E-B3B3-947A5561281F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
"matchCriteriaId": "05B838C9-E60E-46A3-A5FB-4F67291D0851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
"matchCriteriaId": "2B29F111-CBA4-464D-8B25-C2677BA270EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
"matchCriteriaId": "E96C76C5-52BA-45D9-9803-048E770BAA84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
"matchCriteriaId": "42EB3A6A-8B37-47E6-AA9B-1B13FC08F542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
"matchCriteriaId": "F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*",
"matchCriteriaId": "78B9E2C6-0E23-4AC9-906F-28BBC15868DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F75542-F2C5-4CEB-B655-E0620408A3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC41749-91FC-43DB-A52F-AC3E3A2205C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
"matchCriteriaId": "EE0195AE-24FD-43B2-892B-F646B8B5ED6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
"matchCriteriaId": "316924D4-10D4-4C98-AF05-DDE1D530A205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*",
"matchCriteriaId": "91F44EC8-13BF-4032-9EBA-0D50C6A353BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB679F-FA51-47A1-BB3E-97AB517AFBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDCF5A7-14E5-4E0C-88AD-7F891B5EFC66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*",
"matchCriteriaId": "F7111CAE-9279-49DA-B05A-046BB3EFA85F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*",
"matchCriteriaId": "A4203A9F-BBC3-4BF2-B915-C3BF2EB73EAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*",
"matchCriteriaId": "E186AB2F-8C5B-45E0-9194-BF66DA64F772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*",
"matchCriteriaId": "6B27825D-099A-4733-8D3F-8EF2B050E5B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*",
"matchCriteriaId": "F1579A2D-955F-4CC6-9F94-9D40C669D903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*",
"matchCriteriaId": "87DC8B40-2093-4D3A-B18B-F95868A36D8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB7E760-8260-4488-B9FB-C741C1763F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F4B373-490C-463F-B518-89D0CABB852C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2B4600-550F-4D5D-9BBD-E035025677BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1A9400-571E-4955-AB84-C49A4255A5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
"matchCriteriaId": "FC70491B-F701-4D33-A314-C686469DBD2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE0B5B8-DEB1-4021-B854-177C0D9FD73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A672BD-87AE-424D-8735-073BBE9CE164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
"matchCriteriaId": "95C033E3-184B-4AC1-B10D-8318FEAF73FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
"matchCriteriaId": "5A68D177-B028-4025-BD7B-82ACDB2D1E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
"matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
"matchCriteriaId": "6E709D6B-61DB-4905-B539-B8488D7E2DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C1C831-556D-4634-AA24-6D64943ED275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
"matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
"matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
"matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
"matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
"matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
"matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
"matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
"matchCriteriaId": "EC38B64C-E246-467F-A185-669497DEA839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
"matchCriteriaId": "FBB42063-9DB5-42DB-825A-53C6DBB51A57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
"matchCriteriaId": "E74B6350-C2F8-4786-8E32-2ED6C188A5E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E26473-A8EF-44C5-B550-5E0B86D31291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
"matchCriteriaId": "663FE3CE-FA09-46A2-9C0D-2797D9137A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
"matchCriteriaId": "761D49D6-0624-41CE-829E-49E7EA679EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*",
"matchCriteriaId": "552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
"matchCriteriaId": "869CEAF7-59D6-4651-8D89-0244D6C430A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
"matchCriteriaId": "059FBAA6-3127-4DF9-99AD-AA3A16317B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
"matchCriteriaId": "0E0E376F-64E1-4632-9A8E-11DC99FB245F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
"matchCriteriaId": "BF440B52-C6AE-4608-BE71-01B354D37BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*",
"matchCriteriaId": "243BEF5E-F693-450E-B274-FD7CF34B6771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*",
"matchCriteriaId": "E7918C59-1678-4F24-A7C2-68824D1B59A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*",
"matchCriteriaId": "DE72804E-600D-47FA-B3BF-36BD3CF13A75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
"matchCriteriaId": "969A5BAA-19D5-4411-BABB-FE55DBA7C7D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
"matchCriteriaId": "54B41182-7AA8-49D1-BAC3-EAF312E43553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
"matchCriteriaId": "E11BBB83-147B-4FBF-B263-77FCCFB2D92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
"matchCriteriaId": "2E84677D-793D-44C5-80E9-FC29C3183278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
"matchCriteriaId": "E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFA2358-6B79-472D-9092-FF99DC3DF042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C26842-FF50-436F-8DB6-15A70082CD1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
"matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
"matchCriteriaId": "9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A31301-AAB0-4744-98B2-695D88798D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
"matchCriteriaId": "ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEB27CF-46B5-4780-964C-C31193614B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1094F9-7222-4DE0-A368-7421ABA66E3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7EA2BB-A52A-438C-8EB5-CD283CACBACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
"matchCriteriaId": "11790F38-3720-45CF-9FD4-A8E5867684D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE2282B-6693-4E4B-8662-501EBC14CD9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
"matchCriteriaId": "A925BA5C-AB2F-4B73-BA93-55664A319CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE02B7C-BC2D-433C-B0A8-E60EDD62538E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*",
"matchCriteriaId": "F9663D24-0D1D-4F46-961F-9D37D3776E90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
"matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E40D5D-F46E-4098-A46A-1A52A343310D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
"matchCriteriaId": "841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
"matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
"matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
"matchCriteriaId": "98FE195E-084B-4F4C-800D-850165DED48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
"matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
"matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
"matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
"matchCriteriaId": "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
"matchCriteriaId": "520304A4-EB15-42A8-A402-8251A4D2076D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
"matchCriteriaId": "139B1182-61A3-4F3D-9E29-758F27917646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC3706F-B00A-405E-917E-7FD5217E0501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
"matchCriteriaId": "1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*",
"matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.0 through 12.4 on Gigabit Switch Router (GSR) devices (aka 12000 Series routers) allows remote attackers to cause a denial of service (device crash) via a malformed Protocol Independent Multicast (PIM) packet."
},
{
"lang": "es",
"value": "Vulnerabilidad en dispositivos Gigabit Switch Router (GSR),(aka 12000 Series routers), de Cisco IOS v12.0 a v12.4. Permite a atacantes de control remoto causar denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes Multidifusi\u00f3n de Protocolo Independiente (Protocol Independent Multicast, PIM) mal formados."
}
],
"id": "CVE-2008-3809",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-09-26T16:21:44.283",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31990"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=16638"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01491.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/31356"
},
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020936"
},
{
"source": "psirt@cisco.com",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2008/2670"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=16638"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a01491.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/31356"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020936"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2008/2670"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5477"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…