Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-0742

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-27 Feb, 2014 | 01:00
Updated At-06 Aug, 2024 | 09:27
Rejected At-
Credits

The Certificate Authority Proxy Function (CAPF) CLI implementation in the CSR management feature in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to read or modify arbitrary files via unspecified vectors, aka Bug ID CSCum95464.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:27 Feb, 2014 | 01:00
Updated At:06 Aug, 2024 | 09:27
Rejected At:
▼CVE Numbering Authority (CNA)

The Certificate Authority Proxy Function (CAPF) CLI implementation in the CSR management feature in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to read or modify arbitrary files via unspecified vectors, aka Bug ID CSCum95464.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://tools.cisco.com/security/center/viewAlert.x?alertId=33045
x_refsource_CONFIRM
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742
vendor-advisory
x_refsource_CISCO
http://www.securitytracker.com/id/1029843
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://tools.cisco.com/security/center/viewAlert.x?alertId=33045
Resource:
x_refsource_CONFIRM
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.securitytracker.com/id/1029843
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://tools.cisco.com/security/center/viewAlert.x?alertId=33045
x_refsource_CONFIRM
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.securitytracker.com/id/1029843
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://tools.cisco.com/security/center/viewAlert.x?alertId=33045
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.securitytracker.com/id/1029843
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:27 Feb, 2014 | 01:55
Updated At:12 Apr, 2025 | 10:46

The Certificate Authority Proxy Function (CAPF) CLI implementation in the CSR management feature in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to read or modify arbitrary files via unspecified vectors, aka Bug ID CSCum95464.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.2MEDIUM
AV:L/AC:L/Au:S/C:C/I:C/A:N
Type: Primary
Version: 2.0
Base score: 6.2
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>unified_communications_manager>>Versions up to 10.0\(1\)(inclusive)
cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>3.3\(5\)
cpe:2.3:a:cisco:unified_communications_manager:3.3\(5\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>3.3\(5\)sr1
cpe:2.3:a:cisco:unified_communications_manager:3.3\(5\)sr1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>3.3\(5\)sr2a
cpe:2.3:a:cisco:unified_communications_manager:3.3\(5\)sr2a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.1\(3\)
cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.1\(3\)sr1
cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.1\(3\)sr2
cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.1\(3\)sr3
cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.1\(3\)sr4
cpe:2.3:a:cisco:unified_communications_manager:4.1\(3\)sr4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2
cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2.1
cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2.2
cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2.3
cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2.3sr1
cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2.3sr2
cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.2.3sr2b
cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>4.3
cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>unified_communications_manager>>10.0
cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742psirt@cisco.com
Vendor Advisory
http://tools.cisco.com/security/center/viewAlert.x?alertId=33045psirt@cisco.com
Vendor Advisory
http://www.securitytracker.com/id/1029843psirt@cisco.com
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tools.cisco.com/security/center/viewAlert.x?alertId=33045af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securitytracker.com/id/1029843af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: http://tools.cisco.com/security/center/viewAlert.x?alertId=33045
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id/1029843
Source: psirt@cisco.com
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0742
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://tools.cisco.com/security/center/viewAlert.x?alertId=33045
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id/1029843
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1135Records found

CVE-2023-20134
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.58%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Web UI Vulnerabilities

Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetingsCisco Webex Meetings
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2023-20063
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.2||HIGH
EPSS-0.04% / 10.86%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 17:11
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Cisco Firepower Threat Defense Software and Cisco Firepower Management Center Code Injection Vulnerability

A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_threat_defenseCisco Firepower Management CenterCisco Firepower Threat Defense Software
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20232
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 26.90%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 21:39
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Tomcat implementation for Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to cause a web cache poisoning attack on an affected device. This vulnerability is due to improper input validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a specific API endpoint on the Unified CCX Finesse Portal. A successful exploit could allow the attacker to cause the internal WebProxy to redirect users to an attacker-controlled host.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_contact_center_expressCisco Unified Contact Center Express
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20020
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.38% / 59.34%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:35
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-broadworks_application_delivery_platform_device_managementbroadworks_xtended_services_platformCisco BroadWorks
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20172
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.14% / 34.84%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 00:00
Updated-24 Oct, 2024 | 17:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Arbitrary File Delete and File Read Vulnerabilities

Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-602
Client-Side Enforcement of Server-Side Security
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20192
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.6||CRITICAL
EPSS-0.11% / 29.50%
||
7 Day CHG-0.10%
Published-28 Jun, 2023 | 00:00
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Expressway Series and Cisco TelePresence Video Communication Server Privilege Escalation Vulnerabilities

Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated attacker with Administrator-level read-only credentials to elevate their privileges to Administrator with read-write credentials on an affected system. Note: "Cisco Expressway Series" refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS) Expressway
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20168
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.1||HIGH
EPSS-0.11% / 29.20%
||
7 Day CHG~0.00%
Published-23 Aug, 2023 | 18:07
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_34200yc-smnexus_56128pnexus_3172tqnx-osnexus_9508nexus_6000nexus_6004nexus_9408mds_9140mds_9506mds_9250inexus_3548-xlnexus_31128pqnexus_3132q-vnexus_6001pnexus_3164qnexus_92348gc-xnexus_3172tq-32tmds_9200nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_5648qmds_9000mds_9718nexus_3464cmds_9700mds_9148smds_9513nexus_9232enexus_36180yc-rmds_9148tnexus_5500nexus_5672upmds_9132tnexus_3264qnexus_1000_virtual_edgenexus_3432d-snexus_7004nexus_34180ycnexus_3232mds_9509nexus_31108pc-vmds_9706nexus_5596upnexus_7009nexus_3524mds_9216nexus_3548mds_9500mds_9216anexus_7018nexus_5696qmds_9100mds_9148nexus_3048nexus_9504nexus_6001nexus_3524-xlmds_9396tnexus_7000nexus_7010mds_9396snexus_3172pqnexus_5548upmds_9222inexus_1000vmds_9216inexus_5596tnexus_3264c-enexus_5624qnexus_3548-xnexus_6004xnexus_3132q-xlmds_9710nexus_3172tq-xlnexus_3408-snexus_6001tnexus_9516mds_9134nexus_3172pq-xlnexus_5600nexus_5672up-16gCisco NX-OS Software
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20169
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.09% / 25.04%
||
7 Day CHG~0.00%
Published-23 Aug, 2023 | 18:19
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload. This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_3548nexus_34200yc-smnexus_3172tqnx-osnexus_9508nexus_9408nexus_9504nexus_3048nexus_3524-xlnexus_3548-xlnexus_31128pqnexus_3132q-vnexus_3164qnexus_3172pqnexus_3172tq-32tnexus_92348gc-xnexus_3132c-znexus_3524-xnexus_31108tc-vnexus_3464cnexus_9232enexus_36180yc-rnexus_3264c-enexus_3264qnexus_3548-xnexus_3132q-xlnexus_3432d-snexus_3172tq-xlnexus_3408-snexus_34180ycnexus_3232nexus_31108pc-vnexus_9516nexus_3172pq-xlnexus_3524Cisco NX-OS Software
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20072
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.80% / 73.96%
||
7 Day CHG~0.00%
Published-23 Mar, 2023 | 00:00
Updated-28 Oct, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Fragmented Tunnel Protocol Packet Denial of Service Vulnerability

A vulnerability in the fragmentation handling code of tunnel protocol packets in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected system to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of large fragmented tunnel protocol packets. One example of a tunnel protocol is Generic Routing Encapsulation (GRE). An attacker could exploit this vulnerability by sending crafted fragmented packets to an affected system. A successful exploit could allow the attacker to cause the affected system to reload, resulting in a DoS condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20045
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.25% / 47.97%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:39
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco Small Business RV160 and RV260 Series VPN Routers could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands using root-level privileges on the affected device. To exploit this vulnerability, the attacker must have valid Administrator-level credentials on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv160_vpn_routerrv160w_wireless-ac_vpn_routerrv160_vpn_router_firmwarerv260p_vpn_router_with_poerv160w_wireless-ac_vpn_router_firmwarerv260_vpn_routerrv260_vpn_router_firmwarerv260p_vpn_router_with_poe_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20231
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.64% / 70.20%
||
7 Day CHG~0.00%
Published-27 Sep, 2023 | 17:19
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_9300l-48t-4g-ecatalyst_9300l-48p-4g-ecatalyst_9105axwcatalyst_9500hcatalyst_9300l-24t-4g-acatalyst_9300l-24t-4x-acatalyst_9130axecatalyst_9300l_stackcatalyst_9300l-24t-4x-ecatalyst_9300-48un-ecatalyst_9800-l-ccatalyst_9300-48p-acatalyst_9300-24s-acatalyst_9300l-24p-4g-ecatalyst_9120axpcatalyst_9124axicatalyst_9300l-48t-4x-acatalyst_9115axicatalyst_9105axcatalyst_9117axicatalyst_9800-lcatalyst_9300l-24p-4g-acatalyst_9115axcatalyst_9300-48uxm-acatalyst_9300l-24p-4x-ecatalyst_9300-24ux-acatalyst_9300lmcatalyst_9300-24p-acatalyst_9500catalyst_9117axcatalyst_9300-24t-ecatalyst_9300l-24t-4g-ecatalyst_9300-48s-ecatalyst_9300-24u-acatalyst_9800-clcatalyst_9300-48p-ecatalyst_9407rcatalyst_9300lcatalyst_9300-24u-ecatalyst_9300-48t-ecatalyst_9300l-48p-4g-acatalyst_9300xcatalyst_9300-48un-acatalyst_9120axecatalyst_9300l-48t-4g-acatalyst_9300-24p-ecatalyst_9300-48uxm-ecatalyst_9300-48t-acatalyst_9800-l-fcatalyst_9800-80catalyst_9300l-48t-4x-ecatalyst_9300l-48p-4x-ecatalyst_9400catalyst_9130axicatalyst_9800-40catalyst_9300l-48p-4x-acatalyst_9800catalyst_9300-24s-ecatalyst_9300-48u-ecatalyst_9300-48u-acatalyst_9120axcatalyst_9124axdcatalyst_9300-48s-acatalyst_9105axicatalyst_9120axiios_xecatalyst_9115axecatalyst_9130axcatalyst_9300l-24p-4x-acatalyst_9300-24t-acatalyst_9410rcatalyst_9300catalyst_9124axcatalyst_9300-24ux-eCisco IOS XE Softwareios_xe_software
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20255
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 22.31%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 17:02
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in an API of the Web Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause a partial availability condition, which could cause ongoing video calls to be dropped due to the invalid packets reaching the Web Bridge.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-meeting_serverCisco Meeting Server
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20009
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.72%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 15:25
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]]. The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_manageremail_security_applianceCisco Secure Email and Web ManagerCisco Secure Email
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2023-20114
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.41%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 16:43
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower Management Center
CWE ID-CWE-73
External Control of File Name or Path
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20182
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.26% / 49.06%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 00:00
Updated-23 Jul, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco DNA Center Software API Vulnerabilities

Multiple vulnerabilities in the API of Cisco DNA Center Software could allow an authenticated, remote attacker to read information from a restricted container, enumerate user information, or execute arbitrary commands in a restricted container as the root user. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_centerCisco Digital Network Architecture Center (DNA Center)
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-285
Improper Authorization
CVE-2023-20103
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.18% / 40.21%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-25 Oct, 2024 | 16:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Network Analytics Remote Code Execution Vulnerability

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_network_analyticsCisco Secure Network Analytics
CWE ID-CWE-20
Improper Input Validation
CVE-2008-7257
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-27.38% / 96.33%
||
7 Day CHG+6.84%
Published-29 Jun, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF injection vulnerability in +webvpn+/index.html in WebVPN on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to inject arbitrary HTTP headers as demonstrated by a redirect attack involving a %0d%0aLocation%3a sequence in a URI, or conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCsr09163.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asa_5580n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-1223
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.38% / 58.92%
||
7 Day CHG~0.00%
Published-09 May, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The log viewer in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly validate an unspecified parameter, which allows remote attackers to read arbitrary files via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38372.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_customer_voice_portaln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2004-0244
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-1.20% / 78.77%
||
7 Day CHG~0.00%
Published-18 Mar, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco 6000, 6500, and 7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) and a FlexWAN or OSM module allow local users to cause a denial of service (hang or reset) by sending a layer 2 frame packet that encapsulates a layer 3 packet, but has inconsistent length values with that packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-16017
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.10% / 28.46%
||
7 Day CHG~0.00%
Published-23 Sep, 2020 | 00:26
Updated-13 Nov, 2024 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Customer Voice Portal Insecure Direct Object Reference Vulnerability

A vulnerability in the Operations, Administration, Maintenance and Provisioning (OAMP) OpsConsole Server for Cisco Unified Customer Voice Portal (CVP) could allow an authenticated, remote attacker to execute Insecure Direct Object Reference actions on specific pages within the OAMP application. The vulnerability is due to insufficient input validation on specific pages of the OAMP application. An attacker could exploit this vulnerability by authenticating to Cisco Unified CVP and sending crafted HTTP requests. A successful exploit could allow an attacker with administrator or read-only privileges to learn information outside of their expected scope. An attacker with administrator privileges could modify certain configuration details of resources outside of their defined scope, which could result in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_customer_voice_portalCisco Unified Customer Voice Portal (CVP)
CWE ID-CWE-264
Not Available
CWE ID-CWE-20
Improper Input Validation
CVE-2008-4444
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-1.94% / 83.23%
||
7 Day CHG~0.00%
Published-16 Jan, 2009 | 21:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified IP Phone (aka SIP phone) 7960G and 7940G with firmware P0S3-08-9-00 and possibly other versions before 8.10 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a Realtime Transport Protocol (RTP) packet with malformed headers.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_ip_phone_7960gunified_ip_phone_7940gn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12355
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.55% / 67.73%
||
7 Day CHG~0.00%
Published-30 Nov, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Local Packet Transport Services (LPTS) ingress frame-processing functionality of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause one of the LPTS processes on an affected system to restart unexpectedly, resulting in a brief denial of service (DoS) condition. The vulnerability is due to incomplete LPTS frame validation by the affected software. An attacker could exploit this vulnerability by sending crafted XML requests to the management interface of an affected system. A successful exploit could allow the attacker to cause one of the LPTS processes on the affected system to restart unexpectedly, which would impact LPTS traffic and cause a brief DoS condition while the process restarts. Cisco Bug IDs: CSCvf76332.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ios_xrCisco IOS XR
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-12275
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.26% / 48.84%
||
7 Day CHG~0.00%
Published-02 Nov, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of 802.11v Basic Service Set (BSS) Transition Management functionality in Cisco Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of 802.11v BSS Transition Management Response packets that an affected device receives from wireless clients. An attacker could exploit this vulnerability by sending a malformed 802.11v BSS Transition Management Response packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload unexpectedly, resulting in a DoS condition. Cisco Bug IDs: CSCvb57803.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-wireless_lan_controllerwireless_lan_controller_softwareCisco Wireless LAN Controller
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12246
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-3.29% / 87.03%
||
7 Day CHG~0.00%
Published-05 Oct, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of the direct authentication feature in Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of the HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to the local IP address of an affected device. A successful exploit could allow the attacker to cause the affected device to reload. This vulnerability affects Cisco Adaptive Security Appliance (ASA) Software that is running on the following Cisco products: ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, ISA 3000 Industrial Security Appliance. Cisco Bug IDs: CSCvd59063.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwareCisco Adaptive Security Appliance Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-12319
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.94% / 75.99%
||
7 Day CHG~0.00%
Published-27 Mar, 2018 | 09:00
Updated-13 Jan, 2026 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-4351\/k9_integrated_services_routercatalyst_9300l-48t-4g-e82029800-lcatalyst_8500catalyst_9400asr_10011100-4gltegb_integrated_services_routerasr_901s-4sg-f-dcatalyst_9800-l-fcatalyst_9300l-24p-4x-a4331\/k9-ws_integrated_services_routeresr-6300-con-k9asr_1001-x4331\/k9-rf_integrated_services_routerasr_1013catalyst_9600_supervisor_engine-1catalyst_96004351_integrated_services_router1802_integrated_service_routercatalyst_9300l-24t-4g-easr_1009-x1120_integrated_services_routercatalyst_9400_supervisor_engine-14451-x_integrated_services_routercatalyst_9300l-48t-4x-acatalyst_9410r1906c_integrated_services_router1111x-8p_integrated_services_routercloud_services_router_1000vcatalyst_9300-48p-acatalyst_9200l1801_integrated_service_router1109_integrated_services_routercatalyst_9300l-24p-4x-e8101-32fhcatalyst_9300l-48p-4g-ecatalyst_9300l-24t-4x-easr_901-6cz-f-dcatalyst_9300-48p-ecatalyst_9300-24p-e1111x_integrated_services_router9800-80asr_900catalyst_9800-801941_integrated_services_routercatalyst_8300catalyst_9300-48uxm-aasr_901-12c-ft-dcatalyst_9300l-48p-4x-aasr_1004catalyst_9300l-48p-4x-ecatalyst_9300-24t-e1921_integrated_services_routercatalyst_9300-48t-aasr_10004321\/k9_integrated_services_router8800_12-slot8800_8-slotcatalyst_92004331\/k9_integrated_services_routercatalyst_8510msrcatalyst_9800-l-casr_901s-3sg-f-dcatalyst_9300l-24t-4g-aios1100-4g\/6g_integrated_services_routerasr_10069800-cl4451_integrated_services_routercatalyst_8300-2n2s-4t2xcatalyst_8300-1n1s-4t2x44461_integrated_services_router88041861_integrated_service_router1905_integrated_services_routercatalyst_9300catalyst_ie3200_rugged_switchasr_1002-hx_r8101-32hcatalyst_9300-24u-easr_1000-esp200-xasr_1001-x_rasr_901s-3sg-f-ahcatalyst_9300-24s-ecatalyst_9300-48un-ecatalyst_9300lmcatalyst_9300l-24p-4g-a4351\/k9-rf_integrated_services_routercatalyst_ie3300_rugged_switch1160_integrated_services_router4000_integrated_services_router82121100_integrated_services_routerasr_902u8831catalyst_9200cxcatalyst_9300-24ux-aasr_1001-hx_rasr_902catalyst_9300l_stackcatalyst_9800-cl8800_18-slotasr_901-4c-ft-dcatalyst_9300l4321\/k9-ws_integrated_services_router1131_integrated_services_routercatalyst_9300-24p-a111x_integrated_services_router1109-4p_integrated_services_router1803_integrated_service_routercatalyst_9300-24u-aasr_1002-hx1100-6g_integrated_services_routercatalyst_8300-2n2s-6tasr_1000-esp100-xcatalyst_9300-48uxm-e4221_integrated_services_router1100-4g_integrated_services_routerasr_901-6cz-ft-dasr_901-6cz-fs-a1000_integrated_services_router4321_integrated_services_router8800_4-slotasr_1002catalyst_8500lcatalyst_8540msrcatalyst_9300-48s-ecatalyst_9300l-24t-4x-a4431_integrated_services_routercatalyst_9300-48t-ecatalyst_9800asr_901-6cz-fs-d8218asr_1000-x1109-2p_integrated_services_routercatalyst_8300-1n1s-6t4321\/k9-rf_integrated_services_routerasr_1000-esp1001841_integrated_service_routerasr_901-4c-f-dcatalyst_9500hnetwork_convergence_system_520catalyst_9300-48un-aasr_1023asr_1001-hxcatalyst_9300x8208asr_901-6cz-ft-acatalyst_9407r1100-lte_integrated_services_routercatalyst_8200asr_901s-2sg-f-ah4331_integrated_services_routercatalyst_9300-48u-ecatalyst_9300l-48t-4g-acatalyst_9800-401100-4gltena_integrated_services_router1101_integrated_services_router1812_integrated_service_router1101-4p_integrated_services_routerasr_901s-2sg-f-dasr_1002-x_rcatalyst_9600xcatalyst_9800-l88128201-32fhcatalyst_9300l-48p-4g-aintegrated_services_virtual_router8102-64h9800-40catalyst_9300-48s-aios_xeasr_1006-xcatalyst_8540csr1941w_integrated_services_routerasr_1002-xcatalyst_9300-24s-a8818catalyst_9300l-48t-4x-e4461_integrated_services_routercatalyst_9300-24t-acatalyst_9300-48u-a422_integrated_services_routercatalyst_8500-4qccatalyst_9300l-24p-4g-ecatalyst_8510csr8201catalyst_9500esr-6300-ncp-k9catalyst_9300-24ux-e1811_integrated_service_routerasr_901-6cz-f-a1100-8p_integrated_services_router4351\/k9-ws_integrated_services_router88081100-4p_integrated_services_routerasr_901-12c-f-dCisco IOS XEIOS XE Software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12234
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-6.54% / 91.00%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-12 Jan, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-1802_integrated_service_router1100-4gltegb_integrated_services_router1131_integrated_services_router1117-4plteeawe1861_integrated_service_router1101-4p_integrated_services_router1100-4g_integrated_services_routerios1116-4pwe1117-4pmwe1921_integrated_services_router1117-4pwe1801_integrated_service_router1111x-8p1100-6g_integrated_services_router1841_integrated_service_routercatalyst_ie93001100-4p_integrated_services_router1000_integrated_services_router1120esr-6300-ncp-k9esr-6300-con-k91160_integrated_services_router1100-8p_integrated_services_router1100-8p1803_integrated_service_router1116-4plteeawecatalyst_ie3300_rugged_switch1120_connected_grid_router1100-lte_integrated_services_router1117-4pmlteeawe1941_integrated_services_router1111-8pwbcatalyst_ie3400_heavy_duty_switch1111-4pwe1113-8pmwecatalyst_ie3200_rugged_switch1811_integrated_service_router1905_integrated_services_routercatalyst_ie3400_rugged_switch1100-4p1100_terminal_services_gateways1109-4p1109-2p1101-4p1906c_integrated_services_router1100_integrated_services_router1113-8plteeawe1812_integrated_service_router1100-4g\/6g_integrated_services_router1101_integrated_services_router1100-4gltena_integrated_services_router1113-8pwe1120_integrated_services_router1941w_integrated_services_routerCisco IOSIOS software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12223
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.10% / 26.94%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the ROM Monitor (ROMMON) code of Cisco IR800 Integrated Services Router Software could allow an unauthenticated, local attacker to boot an unsigned Hypervisor on an affected device and compromise the integrity of the system. The vulnerability is due to insufficient sanitization of user input. An attacker who can access an affected router via the console could exploit this vulnerability by entering ROMMON mode and modifying ROMMON variables. A successful exploit could allow the attacker to execute arbitrary code and install a malicious version of Hypervisor firmware on an affected device. Cisco Bug IDs: CSCvb44027.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ir800_integrated_services_router_firmwareir800_integrated_services_routerCisco IR800 Integrated Services Router
CWE ID-CWE-20
Improper Input Validation
CVE-2019-15273
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.22% / 44.60%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 18:36
Updated-21 Nov, 2024 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Collaboration Endpoint Software Arbitrary File Overwrite Vulnerabilities

Multiple vulnerabilities in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to overwrite arbitrary files. The vulnerabilities are due to insufficient permission enforcement. An attacker could exploit these vulnerabilities by authenticating as the remote support user and submitting malicious input to specific commands. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying filesystem. The attacker has no control over the contents of the data written to the file. Overwriting a critical file could cause the device to crash, resulting in a denial of service condition (DoS).

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_collaboration_endpointCisco TelePresence TC Software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12287
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.50% / 65.56%
||
7 Day CHG~0.00%
Published-19 Oct, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the cluster database (CDB) management component of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) Software could allow an authenticated, remote attacker to cause the CDB process on an affected system to restart unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete input validation of URL requests by the REST API of the affected software. An attacker could exploit this vulnerability by sending a crafted URL to the REST API of the affected software on an affected system. A successful exploit could allow the attacker to cause the CDB process on the affected system to restart unexpectedly, resulting in a temporary DoS condition. Cisco Bug IDs: CSCve77571.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_conductorexpresswaytelepresence_video_communication_serverCisco Expressway Series and Cisco TelePresence Video Communication Server
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-12215
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.1||HIGH
EPSS-0.89% / 75.32%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Email Security Appliance
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12338
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.16% / 36.62%
||
7 Day CHG~0.00%
Published-30 Nov, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI of Cisco NX-OS System Software could allow an authenticated, local attacker to read the contents of arbitrary files. The vulnerability is due to insufficient input validation for a specific CLI command. An attacker could exploit this vulnerability by issuing a crafted command on the CLI. An exploit could allow the attacker unauthorized access to read arbitrary files on the underlying local file system. On products that support multiple virtual device contexts (VDCs), this vulnerability could allow an attacker to read files from any VDC. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System Manager. Cisco Bug IDs: CSCve51707, CSCve93961, CSCve93964, CSCve93965, CSCve93968, CSCve93974, CSCve93976.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemnx-oslan_switch_softwareCisco NX-OS
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12233
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-6.54% / 91.00%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-12 Jan, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-1802_integrated_service_router1100-4gltegb_integrated_services_router1131_integrated_services_router1117-4plteeawe1861_integrated_service_router1101-4p_integrated_services_router1100-4g_integrated_services_routerios1116-4pwe1117-4pmwe1921_integrated_services_router1117-4pwe1801_integrated_service_router1111x-8p1100-6g_integrated_services_router1841_integrated_service_routercatalyst_ie93001100-4p_integrated_services_router1000_integrated_services_router1120esr-6300-ncp-k9esr-6300-con-k91160_integrated_services_router1100-8p_integrated_services_router1100-8p1803_integrated_service_router1116-4plteeawecatalyst_ie3300_rugged_switch1120_connected_grid_router1100-lte_integrated_services_router1117-4pmlteeawe1941_integrated_services_router1111-8pwbcatalyst_ie3400_heavy_duty_switch1111-4pwe1113-8pmwecatalyst_ie3200_rugged_switch1811_integrated_service_router1905_integrated_services_routercatalyst_ie3400_rugged_switch1100-4p1100_terminal_services_gateways1109-4p1109-2p1101-4p1906c_integrated_services_router1100_integrated_services_router1113-8plteeawe1812_integrated_service_router1100-4g\/6g_integrated_services_router1101_integrated_services_router1100-4gltena_integrated_services_router1113-8pwe1120_integrated_services_router1941w_integrated_services_routerCisco IOSIOS software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12228
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.32% / 55.01%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco Network Plug and Play application of Cisco IOS 12.4 through 15.6 and Cisco IOS XE 3.3 through 16.4 could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software. Cisco Bug IDs: CSCvc33171.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-12222
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.84%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the wireless controller manager of Cisco IOS XE could allow an unauthenticated, adjacent attacker to cause a restart of the switch and result in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted association request. An exploit could allow the attacker to cause the switch to restart. This vulnerability affects Cisco Catalyst 3650 and 3850 switches running IOS XE Software versions 16.1 through 16.3.3, and acting as wireless LAN controllers (WLC). Cisco Bug IDs: CSCvd45069.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ios_xeCisco IOS XE
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-12273
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.25% / 48.34%
||
7 Day CHG~0.00%
Published-02 Nov, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in 802.11 association request frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient frame validation of the 802.11 association request. An attacker could exploit this vulnerability by sending a malformed 802.11 association request to the targeted device. An exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. This vulnerability affects the following Cisco products running either the Lightweight AP Software or Mobility Express image: Aironet 1560 Series Access Points, Aironet 2800 Series Access Points, Aironet 3800 Series Access Points. Note: The Cisco Aironet 1560 Series Access Point device is supported as of release 8.3.112.0. Cisco Bug IDs: CSCve12189.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-aironet_1562iaironet_3800eaironet_2800eaironet_2800iaironet_3800_firmwareaironet_1562daironet_1562_firmwareaironet_3800iaironet_3800paironet_2800_firmwareaironet_1562eCisco Aironet 1560, 2800, and 3800 Series Access Point Platforms
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12217
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.55% / 67.73%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the General Packet Radio Service (GPRS) Tunneling Protocol ingress packet handler of Cisco ASR 5500 System Architecture Evolution (SAE) Gateways could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation of GPRS Tunneling Protocol packet headers. An attacker could exploit this vulnerability by sending a malformed GPRS Tunneling Protocol packet to an affected device. A successful exploit could allow the attacker to cause the GTPUMGR process on an affected device to restart unexpectedly, resulting in a partial DoS condition. If the GTPUMGR process restarts, there could be a brief impact on traffic passing through the device. Cisco Bug IDs: CSCve07119.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asr_5500asr_5500_firmwareCisco ASR 5500 System Architecture Evolution Gateway
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12218
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.38% / 59.32%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Email Security Appliance
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12334
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 28.87%
||
7 Day CHG~0.00%
Published-30 Nov, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI of Cisco NX-OS System Software could allow an authenticated, local attacker to perform a command injection attack. An attacker would need valid administrator credentials to perform this exploit. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to execute arbitrary commands as root. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System Manager. Cisco Bug IDs: CSCvf15113, CSCvf15122, CSCvf15125, CSCvf15131, CSCvf15143, CSCvg04088.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemnx-osCisco NX-OS
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12300
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.23% / 45.28%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-secure_firewall_management_centerCisco Firepower System Software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12336
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.2||MEDIUM
EPSS-0.10% / 28.46%
||
7 Day CHG~0.00%
Published-30 Nov, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the TCL scripting subsystem of Cisco NX-OS System Software could allow an authenticated, local attacker to escape the interactive TCL shell and gain unauthorized access to the underlying operating system of the device. The vulnerability exists due to insufficient input validation of user-supplied files passed to the interactive TCL shell of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. To exploit this vulnerability, an attacker must have local access and be authenticated to the targeted device with administrative or tclsh execution privileges. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System Manager. Cisco Bug IDs: CSCve93750, CSCve93762, CSCve93763, CSCvg04127.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemnx-osCisco NX-OS
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12311
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.82% / 74.21%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the H.264 decoder function of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a Cisco Meeting Server media process to restart unexpectedly when it receives an illegal H.264 frame. The vulnerability is triggered by an H.264 frame that has an invalid picture parameter set (PPS) value. An attacker could exploit this vulnerability by sending a malformed H.264 frame to the targeted device. An exploit could allow the attacker to cause a denial of service (DoS) condition because the media process could restart. The media session should be re-established within a few seconds, during which there could be a brief interruption in service. Cisco Bug IDs: CSCvg12559.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-meeting_serverCisco Meeting Server
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-12214
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.92% / 75.77%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Operations, Administration, Maintenance, and Provisioning (OAMP) credential reset functionality for Cisco Unified Customer Voice Portal (CVP) could allow an authenticated, remote attacker to gain elevated privileges. The vulnerability is due to a lack of proper input validation. An attacker could exploit this vulnerability by authenticating to the OAMP and sending a crafted HTTP request. A successful exploit could allow the attacker to gain administrator privileges. The attacker must successfully authenticate to the system to exploit this vulnerability. This vulnerability affects Cisco Unified Customer Voice Portal (CVP) running software release 10.5, 11.0, or 11.5. Cisco Bug IDs: CSCve92752.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_customer_voice_portalCisco Unified Customer Voice Portal
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-264
Not Available
CVE-2003-0567
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-24.63% / 96.05%
||
7 Day CHG~0.00%
Published-25 Jul, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ons_15454_optical_transport_platformiosoptical_networking_systems_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12252
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.43%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco FindIT Network Discovery Utility could allow an authenticated, local attacker to perform a DLL preloading attack, potentially causing a partial impact to device availability, confidentiality, and integrity. The vulnerability is due to the application loading a malicious copy of a specific, nondefined DLL file instead of the DLL file it was expecting. An attacker could exploit this vulnerability by placing an affected DLL within the search path of the host system. An exploit could allow the attacker to load a malicious DLL file into the system, thus partially compromising confidentiality, integrity, and availability on the device. Cisco Bug IDs: CSCve89785.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-findit_network_discovery_utilityCisco FindIT
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-426
Untrusted Search Path
CVE-2017-12313
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 20.87%
||
7 Day CHG+0.01%
Published-16 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An untrusted search path (aka DLL Preload) vulnerability in the Cisco Network Academy Packet Tracer software could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-packet_tracerCisco Network Academy Packet Tracer
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-426
Untrusted Search Path
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2012-6395
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.99% / 76.66%
||
7 Day CHG~0.00%
Published-18 Jan, 2013 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Adaptive Security Appliances (ASA) devices with firmware 8.4 do not properly validate unspecified input related to UNC share pathnames, which allows remote authenticated users to cause a denial of service (device crash) via unknown vectors, aka Bug ID CSCuc65775.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asa_1000v_cloud_firewalladaptive_security_applianceasa_5500adaptive_security_appliance_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12240
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-9.90% / 92.90%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-12 Jan, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

The DHCP relay subsystem of Cisco IOS 12.2 through 15.6 and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a DoS condition. Cisco Bug IDs: CSCsm45390, CSCuw77959.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asr_901s-4sg-f-dasr_1000-esp100catalyst_3650-48ts-ecatalyst_3850-48xs-f-sasr_920-24tz-m1101-4p_integrated_services_routercatalyst_3650-48tq-ecatalyst_3850-24t-scatalyst_3850-16xs-sasr_901-6cz-ft-acatalyst_3650-24ts-ecatalyst_3650-24pdmasr_9904catalyst_3650-24td-l1841_integrated_service_routercatalyst_3650-48fs-lcatalyst_3650-12x48fd-scatalyst_3850-48p-lcatalyst_3850-24t-easr_920-4sz-a_r8800_12-slotcatalyst_3650-48pd-scatalyst_3650-48ts-lasr_920-12cz-aasr_10011111x_integrated_services_routerasr_901-6cz-fs-a8101-32fhcatalyst_3850-24xs-sasr_920-24sz-im1100-4gltena_integrated_services_router1120_integrated_services_routercatalyst_3850-24xucatalyst_3850-24p-ecatalyst_3850-24xs-e1100-4gltegb_integrated_services_router1109-4p_integrated_services_routercatalyst_3650-8x24pd-lasr_9901catalyst_3650-48ts-s8202catalyst_3650-12x48uq-ecatalyst_3650-48fs-sasr_920-24sz-masr_1000-esp200-xasr_920-12cz-d1803_integrated_service_routerasr_920-24sz-im_routercatalyst_3850-48f-ecatalyst_3650-12x48uq-lasr_920-10sz-pd_router1811_integrated_service_routercatalyst_3650-48td-s4000_integrated_services_routercatalyst_3850-nm-8-10gasr_901-4c-ft-d8800_4-slotcatalyst_3850-12x48u1100_integrated_services_routercatalyst_3850-48f-s1101_integrated_services_routerasr_920-4sz-a1802_integrated_service_routercatalyst_3850-48xs-ecatalyst_3650-24pd-lasr_901s-3sg-f-ahcatalyst_3650-48fd-lasr_1002-x_rcatalyst_3650-24ts-lcatalyst_3650-24pd-e1111x-8p_integrated_services_routerasr_902u1801_integrated_service_routerasr_1001-x_r1000_integrated_services_routercatalyst_3650-48fq-ecatalyst_3650-24ts-sasr_9903catalyst_3650-48tq-lcatalyst_3650-12x48ur-lasr_901s-2sg-f-dcatalyst_3650-12x48fd-ecatalyst_3850-24xu-e8101-32hcatalyst_3850-48u-lasr_920-4sz-d_routerasr_920-12sz-imasr_9001asr_1001-xasr_1013asr_9010asr_920-10sz-pdcatalyst_3650-8x24uq-sasr_920-24sz-m_rasr_920-12sz-im_rasr_1023asr_901-4c-f-dcatalyst_3850-48u-ecatalyst_3850-24u-easr_903catalyst_3650-8x24pd-s8208asr_901-6cz-f-acatalyst_3850-24ucatalyst_3850-24s-scatalyst_3650-12x48urcatalyst_3650-12x48uqcatalyst_3650-48fqm-scatalyst_3850-24u-scatalyst_3850-24pw-scatalyst_3650-24pdm-s1100-4p_integrated_services_router9800-lasr_901-6cz-fs-dasr_1006-xasr_9906catalyst_3850-24t-lasr_1002-hx_rcatalyst_3850catalyst_3650-12x48ur-e1100-lte_integrated_services_routercatalyst_3650-48td-lcatalyst_3650-48fd-easr_920-4sz-d8804catalyst_3650-48fq-s8831asr_920-12cz-d_routerasr_920-10sz-pd_rcatalyst_3650-8x24uq-l4221_integrated_services_routercatalyst_3650-12x48uq-scatalyst_3850-24xscatalyst_3650-48pq-l111x_integrated_services_routercatalyst_3650-12x48uz-scatalyst_3650-24pdcatalyst_3650-48td-easr_9006asr_900catalyst_3650-48fqm-ecatalyst_3850-24xu-scatalyst_3650-24pdm-l1100-4g_integrated_services_routercatalyst_3650-48tq-scatalyst_3650-24td-ecatalyst_3850-24p-s9800-40asr_920-24sz-m_routercatalyst_3850-12s-scatalyst_3850-24xu-l1160_integrated_services_router1100-8p_integrated_services_routercatalyst_3650-24pd-scatalyst_3850-48u-scatalyst_3650-12x48uzasr_920-12cz-a_rcatalyst_3850-16xs-e1905_integrated_services_router8800_8-slotcatalyst_3650-8x24uq-ecatalyst_3650-48pd-ecatalyst_3850-48f-l1906c_integrated_services_router8201-32fhasr_9912catalyst_3850-48xs-f-ecatalyst_3850-nm-2-40gcatalyst_3850-12s-ecatalyst_3650-24ps-lasr_920-12cz-d_rasr_9922asr_901s-2sg-f-ah1861_integrated_service_router8812catalyst_3850-48xs-scatalyst_3850-32xs-siosasr_901-12c-f-dcatalyst_3650-24ps-s9800-801100-6g_integrated_services_routerasr_907catalyst_3850-48pw-s82128201catalyst_3650-48fqmcatalyst_3650-24pdm-easr_9000vcatalyst_3850-48ucatalyst_3650-12x48fd-lcatalyst_3850-48p-easr_920-24tz-m_rcatalyst_3650-12x48uz-ecatalyst_3850-48t-lcatalyst_3850-48t-sasr_9141812_integrated_service_routercatalyst_3850-24u-lcatalyst_3650-48fs-e1941w_integrated_services_router1109-2p_integrated_services_routercatalyst_3850-24s-easr_1002asr_1000-xasr_1001-hxcatalyst_3850-12xs-sasr_902asr_920-24tz-m_routercatalyst_3850-48t-e8808catalyst_3650-48fqasr_901-6cz-f-d8102-64hcatalyst_3650-48fd-scatalyst_3650-48fq-lcatalyst_3650-48pq-scatalyst_3650-8x24uqcatalyst_3650-12x48ur-s422_integrated_services_routerasr_1009-x8800_18-slot9800-clasr_1004asr_9902catalyst_3650-8x24pd-easr_920-12sz-im_routercatalyst_3650-48ps-scatalyst_3850-32xs-easr_9920catalyst_3850-12xs-easr_920-24sz-im_rcatalyst_3850-48p-sasr_9000asr_920u-12sz-im1131_integrated_services_routercatalyst_3650-48pd-l8818catalyst_3650-24ps-ecatalyst_3650-48pq-ecatalyst_3650asr_920-4sz-a_routerasr_9910catalyst_3650-48ps-lcatalyst_3850-48xscatalyst_3850-24p-l1921_integrated_services_routerasr_1002-hxasr_920-12cz-a_router82181109_integrated_services_routerasr_901s-3sg-f-dasr_1001-hx_rasr_901-12c-ft-dcatalyst_3650-12x48uz-l1941_integrated_services_routerasr_1006asr_920-4sz-d_rasr_1000-esp100-xasr_1000catalyst_3650-24td-sasr_901-6cz-ft-dasr_1002-xcatalyst_3650-48fqm-lcatalyst_3650-48ps-eCisco IOS and IOS XEIOS and IOS XE Software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-20
Improper Input Validation
CVE-2008-2061
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-3.31% / 87.06%
||
7 Day CHG~0.00%
Published-26 Jun, 2008 | 17:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Computer Telephony Integration (CTI) Manager service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3c) and 6.x before 6.1(2) allows remote attackers to cause a denial of service (TSP crash) via malformed network traffic to TCP port 2748.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12255
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.21%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI of Cisco UCS Central Software could allow an authenticated, local attacker to gain shell access. The vulnerability is due to insufficient input validation of commands entered in the CLI, aka a Restricted Shell Break Vulnerability. An attacker could exploit this vulnerability by entering a specific command with crafted arguments. An exploit could allow the attacker to gain shell access to the underlying system. Cisco Bug IDs: CSCve70762.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemCisco UCS Central Software
CWE ID-CWE-20
Improper Input Validation
CVE-2008-2636
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-5.07% / 89.65%
||
7 Day CHG~0.00%
Published-10 Jun, 2008 | 00:00
Updated-07 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTTP service on the Cisco Linksys WRH54G with firmware 1.01.03 allows remote attackers to cause a denial of service (management interface outage) or possibly execute arbitrary code via a URI that begins with a "/./" sequence, contains many instances of a "front_page" sequence, and ends with a ".asp" sequence.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-linksys_wrh54g_routern/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • ...
  • 22
  • 23
  • Next
Details not found