fkie_cve-2012-3949
Vulnerability from fkie_nvd
Published
2012-09-27 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The SIP implementation in Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su5, 8.x before 8.5(1)su4, and 8.6 before 8.6(2a)su1; Cisco IOS 12.2 through 12.4 and 15.0 through 15.2; and Cisco IOS XE 3.3.xSG before 3.3.1SG, 3.4.xS, and 3.5.xS allows remote attackers to cause a denial of service (service crash or device reload) via a crafted SIP message containing an SDP session description, aka Bug IDs CSCtw66721, CSCtj33003, and CSCtw84664.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF99088E-1330-4E15-8BD3-2A5172FBA460", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "C2CD96CE-AAC6-40BD-A053-A62572AC7714", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "48A8EE9A-458D-4619-B04D-F01A9934DC11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "44280E56-C151-4C08-804D-001F91FF2AFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD968A56-9539-4699-9099-0F220D283CB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2597F4-9B5B-4E2E-8DA5-40D769CC57B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F9ABF04-C732-4509-8589-F58E1D5F66E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "172CBA52-EEB8-4082-99C3-F69FBC1C7DA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FC13697F-84A3-4793-B82E-6E8857B4FC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EF973A5-0AC0-46E3-BD1B-C92738261456", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "76DA84D7-1D53-4180-A33F-58E87F8BEB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B591E75E-040C-4D26-AF13-A4F87E048579", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "18986D7E-E1E6-46EB-A247-2A98224FC122", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "46BDD926-7F96-46C5-AD9C-40B7D3C78340", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7BA63076-B8A1-4672-99F3-703F7838F3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "2EA15D48-A0DE-4091-8C78-666E98B488C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2ECDCE1A-176D-46E0-9C39-19FAD7B57892", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F61FD826-A08E-477C-AA57-359B10387035", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "7A9EDB91-350B-4ED4-A177-257023380C44", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "2CBA6140-CEF7-4990-9A1E-76F02607BA84", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1a:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF2F2A-DF52-4BD8-A56B-B4E91CD1D1E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0A5B28-0211-4173-BD91-67BCA3267C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su3:*:*:*:*:*:*:*", "matchCriteriaId": "74323C2F-949A-4A97-8A1A-1D0A470B93BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su4:*:*:*:*:*:*:*", "matchCriteriaId": "E69A9EC1-7078-4866-986E-D2842CFDC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "248E4608-B870-4913-8048-3771685CBD77", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "52D7EECA-322E-48E4-9682-6C3C39B64B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "547E3100-EFBF-4F30-8D9E-81F8B79D9F9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BCE55716-ACB7-411B-B708-415D4DB1D8AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "916C8A47-B3DA-42C0-BE2F-041269F79CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C09FE52A-E0AF-4B0F-A44E-4362E26A88D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "07EF7BE6-2702-4174-A8AA-AFD44014F8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "56403D34-B803-4DA7-96BC-2E0797D27F69", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su1:*:*:*:*:*:*:*", "matchCriteriaId": "F61E277B-475A-40EC-8A67-CE2A17C94185", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su2:*:*:*:*:*:*:*", "matchCriteriaId": "D289E6D8-EA6A-4487-9513-6CCEE3740EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su3:*:*:*:*:*:*:*", "matchCriteriaId": "0FAA377E-3C37-4E9D-97E7-FDC162CF8FC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "matchCriteriaId": "E314B0F7-1A27-483E-B3B3-947A5561281F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "matchCriteriaId": "05B838C9-E60E-46A3-A5FB-4F67291D0851", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "matchCriteriaId": "2B29F111-CBA4-464D-8B25-C2677BA270EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", "matchCriteriaId": "E96C76C5-52BA-45D9-9803-048E770BAA84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", "matchCriteriaId": "42EB3A6A-8B37-47E6-AA9B-1B13FC08F542", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*", "matchCriteriaId": "22D57BED-1D99-4077-941C-E60BEA65324E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", "matchCriteriaId": "F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", "matchCriteriaId": "78B9E2C6-0E23-4AC9-906F-28BBC15868DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", "matchCriteriaId": "B7F75542-F2C5-4CEB-B655-E0620408A3B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "matchCriteriaId": "7B7EA3DA-33B3-4480-B3B8-413745D6C5FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41749-91FC-43DB-A52F-AC3E3A2205C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", "matchCriteriaId": "EE0195AE-24FD-43B2-892B-F646B8B5ED6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", "matchCriteriaId": "316924D4-10D4-4C98-AF05-DDE1D530A205", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", "matchCriteriaId": "11866346-C29A-463D-A18F-528C23DD579E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", "matchCriteriaId": "0912492E-565A-4559-ABB8-D2898F06CF29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*", "matchCriteriaId": "2CD6421A-D8C4-4A3E-9497-4AC130CFE597", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", "matchCriteriaId": "91F44EC8-13BF-4032-9EBA-0D50C6A353BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*", "matchCriteriaId": "370EEE74-3DAA-4BB2-9192-66672229DC39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*", "matchCriteriaId": "4CF74B28-CD95-4BC6-97D4-D529D30E1509", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*", "matchCriteriaId": "F2EB679F-FA51-47A1-BB3E-97AB517AFBB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*", "matchCriteriaId": "7B88D71E-C9CB-44D7-AB06-49CFF1117DA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*", "matchCriteriaId": "DEDCF5A7-14E5-4E0C-88AD-7F891B5EFC66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*", "matchCriteriaId": "F7111CAE-9279-49DA-B05A-046BB3EFA85F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*", "matchCriteriaId": "A4203A9F-BBC3-4BF2-B915-C3BF2EB73EAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*", "matchCriteriaId": "E186AB2F-8C5B-45E0-9194-BF66DA64F772", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*", "matchCriteriaId": "D32DCDA3-76B6-423C-9AF1-B65F19077909", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*", "matchCriteriaId": "BCCE26DD-FE65-4041-AB4D-9C7A16EE175C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*", "matchCriteriaId": "FE88965B-D148-43EB-9FC6-2EF5E5C917FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2l:*:*:*:*:*:*:*", "matchCriteriaId": "6FEFEFF0-65E0-4F68-8C9E-03DAC585CA5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", "matchCriteriaId": "6B27825D-099A-4733-8D3F-8EF2B050E5B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2rc:*:*:*:*:*:*:*", "matchCriteriaId": "A4577947-7960-4627-9A74-9C3BB6477DDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "matchCriteriaId": "ADBDC6C0-961B-441D-8C34-AACE0902057E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", "matchCriteriaId": "F1579A2D-955F-4CC6-9F94-9D40C669D903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "matchCriteriaId": "140C7C99-1B50-431C-B55C-DFF308E7ECF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*", "matchCriteriaId": "65213862-01D0-4B1D-8C76-B19D083BF460", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*", "matchCriteriaId": "F05A548B-C443-4C15-B636-64C1F9B9860D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*", "matchCriteriaId": "87DC8B40-2093-4D3A-B18B-F95868A36D8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*", "matchCriteriaId": "CFB7E760-8260-4488-B9FB-C741C1763F40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*", "matchCriteriaId": "A8F4B373-490C-463F-B518-89D0CABB852C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*", "matchCriteriaId": "9A2B4600-550F-4D5D-9BBD-E035025677BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2see:*:*:*:*:*:*:*", "matchCriteriaId": "1F42A6D9-8CC3-49AF-AA56-96894CCE5AF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sef:*:*:*:*:*:*:*", "matchCriteriaId": "A4474AB2-AFF5-46F1-9066-54A4D6FA98C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2seg:*:*:*:*:*:*:*", "matchCriteriaId": "7D81068C-7E72-4D5E-84CA-5942B9E8AB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*", "matchCriteriaId": "E85ABE5E-7900-4A9C-A945-48B293EF46B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*", "matchCriteriaId": "43E166F3-931A-4997-B7B2-F2AD19C6F209", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*", "matchCriteriaId": "9A70BEC7-8A69-44B2-9DDA-DFC1A13EB7B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sr:*:*:*:*:*:*:*", "matchCriteriaId": "BDE7C923-7CBB-4990-905B-9DD9D7D5946A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "matchCriteriaId": "A892B3F0-5A31-4086-8AB5-F06E68588EFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*", "matchCriteriaId": "D8E6BB50-7C0C-4E31-8DB0-40E145C8D9CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*", "matchCriteriaId": "8A0DA930-86CE-4D17-BD41-9C4E47D8088F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", "matchCriteriaId": "FC70491B-F701-4D33-A314-C686469DBD2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", "matchCriteriaId": "198C24E9-6D45-44FD-B502-D14ACDA99EDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*", "matchCriteriaId": "E768F600-19DC-46A5-BDED-3C2497530CD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*", "matchCriteriaId": "16EF97B1-5150-4E88-B011-DB8F0AAFA9CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*", "matchCriteriaId": "CDC263E7-BA6A-41CB-8248-5DDB4404D9BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*", "matchCriteriaId": "544835A2-3AB0-4313-A731-54B1123F7498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", "matchCriteriaId": "5DEF14D5-1327-4012-913F-DA0E12C4E953", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", "matchCriteriaId": "4DE0B5B8-DEB1-4021-B854-177C0D9FD73A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", "matchCriteriaId": "E7A672BD-87AE-424D-8735-073BBE9CE164", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", "matchCriteriaId": "95C033E3-184B-4AC1-B10D-8318FEAF73FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", "matchCriteriaId": "FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", "matchCriteriaId": "5A68D177-B028-4025-BD7B-82ACDB2D1E21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", "matchCriteriaId": "485ACF9E-1305-4D71-A766-5BE1D748AAA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sxi:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0702-070F-48D5-9CBC-DB36D409A4EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", "matchCriteriaId": "6E709D6B-61DB-4905-B539-B8488D7E2DC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", "matchCriteriaId": "F6C1C831-556D-4634-AA24-6D64943ED275", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "matchCriteriaId": "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "matchCriteriaId": "4D717498-4DF9-4D15-A25B-D777FF460E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*", "matchCriteriaId": "17AA0C3D-7C96-4D2E-91E5-232536245ABF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*", "matchCriteriaId": "5D57ACB3-4ADC-4FBE-BA46-395F277B9997", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*", "matchCriteriaId": "E2916FA5-1FFF-48FB-A079-693AD3444CC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*", "matchCriteriaId": "1EE03B1E-1522-4143-A019-B19E1F605A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "matchCriteriaId": "EC38B64C-E246-467F-A185-669497DEA839", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", "matchCriteriaId": "FBB42063-9DB5-42DB-825A-53C6DBB51A57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "matchCriteriaId": "E74B6350-C2F8-4786-8E32-2ED6C188A5E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "matchCriteriaId": "F8E26473-A8EF-44C5-B550-5E0B86D31291", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "matchCriteriaId": "663FE3CE-FA09-46A2-9C0D-2797D9137A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", "matchCriteriaId": "761D49D6-0624-41CE-829E-49E7EA679EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "matchCriteriaId": "552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", "matchCriteriaId": "869CEAF7-59D6-4651-8D89-0244D6C430A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "matchCriteriaId": "059FBAA6-3127-4DF9-99AD-AA3A16317B6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "matchCriteriaId": "0E0E376F-64E1-4632-9A8E-11DC99FB245F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "matchCriteriaId": "BF440B52-C6AE-4608-BE71-01B354D37BEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", "matchCriteriaId": "243BEF5E-F693-450E-B274-FD7CF34B6771", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", "matchCriteriaId": "E7918C59-1678-4F24-A7C2-68824D1B59A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "matchCriteriaId": "DE72804E-600D-47FA-B3BF-36BD3CF13A75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "matchCriteriaId": "DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*", "matchCriteriaId": "7F5B9BAF-59BA-4282-B387-489264D44429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "matchCriteriaId": "969A5BAA-19D5-4411-BABB-FE55DBA7C7D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "matchCriteriaId": "54B41182-7AA8-49D1-BAC3-EAF312E43553", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "matchCriteriaId": "E11BBB83-147B-4FBF-B263-77FCCFB2D92D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "matchCriteriaId": "2E84677D-793D-44C5-80E9-FC29C3183278", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", "matchCriteriaId": "E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "matchCriteriaId": "ECFA2358-6B79-472D-9092-FF99DC3DF042", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", "matchCriteriaId": "A3C26842-FF50-436F-8DB6-15A70082CD1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "matchCriteriaId": "9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "matchCriteriaId": "F4A31301-AAB0-4744-98B2-695D88798D9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "matchCriteriaId": "ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "matchCriteriaId": "0CEB27CF-46B5-4780-964C-C31193614B74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "matchCriteriaId": "0F1094F9-7222-4DE0-A368-7421ABA66E3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "matchCriteriaId": "6C7EA2BB-A52A-438C-8EB5-CD283CACBACE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "matchCriteriaId": "574FFD6F-D56C-41DB-A978-E501BA3CA5D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "matchCriteriaId": "11790F38-3720-45CF-9FD4-A8E5867684D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "matchCriteriaId": "4AE2282B-6693-4E4B-8662-501EBC14CD9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "matchCriteriaId": "A925BA5C-AB2F-4B73-BA93-55664A319CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*", "matchCriteriaId": "9AE02B7C-BC2D-433C-B0A8-E60EDD62538E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*", "matchCriteriaId": "F9663D24-0D1D-4F46-961F-9D37D3776E90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*", "matchCriteriaId": "E83649EC-61A5-4937-93F4-42D082023382", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*", "matchCriteriaId": "5D8830A0-E816-40C4-8743-A9E0994BA922", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "0668C45B-9D25-424B-B876-C1721BFFE5DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "matchCriteriaId": "292F6F99-19B3-4106-A432-5DE916CCDD56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", "matchCriteriaId": "40183EF8-BD19-49AD-9E55-7FCCA635327F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", "matchCriteriaId": "B8E40D5D-F46E-4098-A46A-1A52A343310D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "matchCriteriaId": "D73E5138-016A-48EC-A367-3D3285AAFED2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", "matchCriteriaId": "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", "matchCriteriaId": "9CD5C082-9730-466D-A4A8-E4EEE5F3730D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", "matchCriteriaId": "8CF419BD-8474-4F33-9CDD-587E341ABA8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*", "matchCriteriaId": "332B0446-4D8B-414B-B572-84B45D5643AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*", "matchCriteriaId": "BE0A39D0-0E87-42E9-B8D3-2010FDCC03D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*", "matchCriteriaId": "D40FB896-E20C-46B1-BF59-FBB42295F9C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "matchCriteriaId": "C0C3B413-76F7-413B-A51F-29834F9DE722", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*", "matchCriteriaId": "841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*", "matchCriteriaId": "B418CFDD-AF36-46F9-B347-B34E72100F95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", "matchCriteriaId": "84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", "matchCriteriaId": "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "matchCriteriaId": "A9F12741-69FB-46DD-A670-8461492B338A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "matchCriteriaId": "7EC2D158-6174-4AE8-83DA-125B072B6980", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "matchCriteriaId": "A5688D88-A550-43EB-8854-2E132EC71156", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "matchCriteriaId": "8218E2D3-4F1E-440F-A2B2-A68D4692BB17", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "matchCriteriaId": "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", "matchCriteriaId": "AA212293-7BAF-4AD9-BD30-E953CBA7CB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "matchCriteriaId": "1018E04C-5575-4D1A-B482-D1CDB9AD6A50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", "matchCriteriaId": "68FC4904-1F4D-4E10-AF95-911B07827598", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "matchCriteriaId": "86B9E611-3F06-424C-96EF-EE4997C70AB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "matchCriteriaId": "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", "matchCriteriaId": "98FE195E-084B-4F4C-800D-850165DED48C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "matchCriteriaId": "FB74F350-37F8-48DF-924E-415E51932163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "matchCriteriaId": "E618BF54-56DC-40FC-A515-3BFB4366F823", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "matchCriteriaId": "A1976E53-85A6-494F-B8AC-847E7988850C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "matchCriteriaId": "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", "matchCriteriaId": "9A668D08-14C4-4438-A59C-CE60498BEF8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", "matchCriteriaId": "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", "matchCriteriaId": "520304A4-EB15-42A8-A402-8251A4D2076D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "matchCriteriaId": "C46B66D6-1BF1-4DCA-868F-BADE3CB96063", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "matchCriteriaId": "CA88C064-898F-4C0D-A266-D7B3509C28A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", "matchCriteriaId": "139B1182-61A3-4F3D-9E29-758F27917646", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", "matchCriteriaId": "1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "matchCriteriaId": "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", "matchCriteriaId": "2595DCBA-E6F2-4551-A804-4DBB137F076B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DF12B-2A20-4AC5-8EC5-729008D87736", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "matchCriteriaId": "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", "matchCriteriaId": "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "matchCriteriaId": "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "matchCriteriaId": "2958873B-A0AB-4EAF-A5CF-8423739FAB07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", "matchCriteriaId": "1938D118-C07F-4BEC-8030-947F099BFCB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*", "matchCriteriaId": "3870C62F-D086-419C-A0E6-815E9ED5DE3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s1:*:*:*:*:*:*:*", "matchCriteriaId": "54966D6A-5471-4685-9FCC-C3F75297F2A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s2:*:*:*:*:*:*:*", "matchCriteriaId": "A6AEE27B-B0A8-486C-8E12-D789047401B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*", "matchCriteriaId": "971AAF00-63AA-4B3F-8E0F-B8FBD011C071", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0m:*:*:*:*:*:*:*", "matchCriteriaId": "3D03374C-7EF0-4455-839E-09CA4F2E85BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0mr:*:*:*:*:*:*:*", "matchCriteriaId": "8199BA12-E3A6-447E-A5D0-AC69BB7D2441", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0mra:*:*:*:*:*:*:*", "matchCriteriaId": "D1B62095-2371-41DF-9892-70120C262EC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0s:*:*:*:*:*:*:*", "matchCriteriaId": "F3EB72C9-C9AA-4E5C-8E87-A1AAA09AC5D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0sa:*:*:*:*:*:*:*", "matchCriteriaId": "DF614A4F-F23D-4123-85E5-E0F06C6BAB95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0sg:*:*:*:*:*:*:*", "matchCriteriaId": "58870B6A-55D2-4BFA-89F9-9332205CC130", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0xa:*:*:*:*:*:*:*", "matchCriteriaId": "EC6EF56C-032C-43F6-A979-E18BEA0E16A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0xo:*:*:*:*:*:*:*", "matchCriteriaId": "61D28B5C-F578-47E1-A8AC-A79D8A7F340C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB41294E-F3DF-4F1E-A4C8-E90B21A88836", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)xb1:*:*:*:*:*:*:*", "matchCriteriaId": "2D30CD49-F004-4830-A33E-9FC6E423CEA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "5D14775C-95F5-4507-9837-CA818489CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*", "matchCriteriaId": "855B1020-7FB6-46D1-ABAF-5618590CF329", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*", "matchCriteriaId": "8DEBAA67-9C88-48CE-88F7-4B5463B87B68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*", "matchCriteriaId": "2B71E784-53C0-46AE-AB6E-9B4CB5FAFFFA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1ey:*:*:*:*:*:*:*", "matchCriteriaId": "DF6528FF-7F24-4919-BE68-E51D3FFD5123", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1gc:*:*:*:*:*:*:*", "matchCriteriaId": "B8665036-2C40-498A-B022-F6DA288D1581", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1m:*:*:*:*:*:*:*", "matchCriteriaId": "0F2359A4-8494-4BBA-85E5-C4E66D9362CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1s:*:*:*:*:*:*:*", "matchCriteriaId": "8A9B1D5E-02CA-4949-8ACB-9B40642816B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1t:*:*:*:*:*:*:*", "matchCriteriaId": "5FAFA073-B16F-475F-B68D-8FE9135AB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1xb:*:*:*:*:*:*:*", "matchCriteriaId": "34137E45-7EC0-4350-9F6D-B427CE07D693", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2AB6A02-B7C7-48D1-8857-BD1CDF9A40D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*", "matchCriteriaId": "737D7668-872C-4246-9AB9-12FF059E231A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", "matchCriteriaId": "B45225F2-C9EB-493D-B845-64BFB8DBB89B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", "matchCriteriaId": "252377A3-7F15-45F2-A169-BBC37858D4DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*", "matchCriteriaId": "02E8F96A-EA9C-4E66-8491-9B2A3A4023F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*", "matchCriteriaId": "85908754-8426-49D3-BCC2-AF174B5D0EF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*", "matchCriteriaId": "7F5BA973-D59A-4CB9-BC35-089F88737425", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*", "matchCriteriaId": "B7D36DA8-0CBC-424F-80FB-A59839C49FE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", "matchCriteriaId": "5872A42F-745E-4EC6-8679-C28F79F6621C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*", "matchCriteriaId": "86947E54-A1B9-4ECE-92A6-417462249612", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*", "matchCriteriaId": "C910BE7C-517F-4E41-8433-1858F700AA22", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*", "matchCriteriaId": "A862D914-CE60-48A9-9D52-299642BE3FF6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SIP implementation in Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su5, 8.x before 8.5(1)su4, and 8.6 before 8.6(2a)su1; Cisco IOS 12.2 through 12.4 and 15.0 through 15.2; and Cisco IOS XE 3.3.xSG before 3.3.1SG, 3.4.xS, and 3.5.xS allows remote attackers to cause a denial of service (service crash or device reload) via a crafted SIP message containing an SDP session description, aka Bug IDs CSCtw66721, CSCtj33003, and CSCtw84664." }, { "lang": "es", "value": "La implementaci\u00f3n SIP en Cisco Unified Communications Manager (CUCM) v6.x y v7.x anteriores a v7.1(5b)su5, v8.x anteriores a v8.5(1)su4, y v8.6 anteriores a v8.6(2a)su1; Cisco IOS v12.2 hasta v12.4 y v15.0 hasta v15.2; y Cisco IOS XE v3.3.xSG anteriores a v3.3.1SG, v3.4.xS, y 3.5.xS permite a atacantes remotos a provocar una denegaci\u00f3n de servicio (ca\u00edda del servicio o recarga de dispositivo) a trav\u00e9s de mensajes SIP manipulados que contienen la descripci\u00f3n de una sesi\u00f3n SDP, tambi\u00e9n conocido como Bug IDs CSCtw66721, CSCtj33003, y CSCtw84664." } ], "id": "CVE-2012-3949", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-27T00:55:00.797", "references": [ { "source": "psirt@cisco.com", "tags": [ "Broken Link" ], "url": "http://osvdb.org/85816" }, { "source": "psirt@cisco.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/50774" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-cucm" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-sip" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/55697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/85816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/50774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-cucm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-sip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/55697" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…