Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-0372

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-18 Jul, 2018 | 23:00
Updated At-29 Nov, 2024 | 14:51
Rejected At-
Credits

A vulnerability in the DHCPv6 feature of the Cisco Nexus 9000 Series Fabric Switches in Application-Centric Infrastructure (ACI) Mode could allow an unauthenticated, remote attacker to cause the device to run low on system memory, which could result in a Denial of Service (DoS) condition on an affected system. The vulnerability is due to improper memory management when DHCPv6 packets are received on an interface of the targeted device. An attacker could exploit this vulnerability by sending a high number of malicious DHCPv6 packets to be processed by an affected device. A successful exploit could allow the attacker to cause the system to run low on memory, which could cause an eventual reboot of an affected device. The vulnerability only applies to IPv6 protocol packets and not for IPv4 protocol packets. This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI Mode running software version 13.0(1k). The vulnerability can only be exploited when unicast routing is enabled on the Bridge Domain (BD). DHCP and DHCP relay do not have to be configured for the vulnerability to be exploited. Cisco Bug IDs: CSCvg38918.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:18 Jul, 2018 | 23:00
Updated At:29 Nov, 2024 | 14:51
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the DHCPv6 feature of the Cisco Nexus 9000 Series Fabric Switches in Application-Centric Infrastructure (ACI) Mode could allow an unauthenticated, remote attacker to cause the device to run low on system memory, which could result in a Denial of Service (DoS) condition on an affected system. The vulnerability is due to improper memory management when DHCPv6 packets are received on an interface of the targeted device. An attacker could exploit this vulnerability by sending a high number of malicious DHCPv6 packets to be processed by an affected device. A successful exploit could allow the attacker to cause the system to run low on memory, which could cause an eventual reboot of an affected device. The vulnerability only applies to IPv6 protocol packets and not for IPv4 protocol packets. This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI Mode running software version 13.0(1k). The vulnerability can only be exploited when unicast routing is enabled on the Bridge Domain (BD). DHCP and DHCP relay do not have to be configured for the vulnerability to be exploited. Cisco Bug IDs: CSCvg38918.

Affected Products
Vendor
n/a
Product
Cisco Nexus 9000 Series unknown
Versions
Affected
  • Cisco Nexus 9000 Series unknown
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400
Type: CWE
CWE ID: CWE-400
Description: CWE-400
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dos
x_refsource_CONFIRM
http://www.securitytracker.com/id/1041348
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dos
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1041348
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dos
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1041348
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dos
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041348
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:18 Jul, 2018 | 23:29
Updated At:09 Oct, 2019 | 23:31

A vulnerability in the DHCPv6 feature of the Cisco Nexus 9000 Series Fabric Switches in Application-Centric Infrastructure (ACI) Mode could allow an unauthenticated, remote attacker to cause the device to run low on system memory, which could result in a Denial of Service (DoS) condition on an affected system. The vulnerability is due to improper memory management when DHCPv6 packets are received on an interface of the targeted device. An attacker could exploit this vulnerability by sending a high number of malicious DHCPv6 packets to be processed by an affected device. A successful exploit could allow the attacker to cause the system to run low on memory, which could cause an eventual reboot of an affected device. The vulnerability only applies to IPv6 protocol packets and not for IPv4 protocol packets. This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI Mode running software version 13.0(1k). The vulnerability can only be exploited when unicast routing is enabled on the Bridge Domain (BD). DHCP and DHCP relay do not have to be configured for the vulnerability to be exploited. Cisco Bug IDs: CSCvg38918.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>nx-os>>13.0\(1k\)
cpe:2.3:o:cisco:nx-os:13.0\(1k\):*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_92160yc-x>>-
cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_92304qc>>-
cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9236c>>-
cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9272q>>-
cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_93108tc-ex>>-
cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_93120tx>>-
cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_93128tx>>-
cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_93180yc-ex>>-
cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9332pq>>-
cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9372px>>-
cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9372tx>>-
cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9396px>>-
cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9396tx>>-
cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9504>>-
cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9508>>-
cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_9516>>-
cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_n9k-c9508-fm-r>>-
cpe:2.3:h:cisco:nexus_n9k-c9508-fm-r:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_n9k-x9636c-r>>-
cpe:2.3:h:cisco:nexus_n9k-x9636c-r:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>nexus_n9k-x9636q-r>>-
cpe:2.3:h:cisco:nexus_n9k-x9636q-r:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Primarynvd@nist.gov
CWE-400Secondaryykramarz@cisco.com
CWE ID: CWE-400
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-400
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securitytracker.com/id/1041348ykramarz@cisco.com
Third Party Advisory
VDB Entry
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dosykramarz@cisco.com
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id/1041348
Source: ykramarz@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-20180718-nexus-9000-dos
Source: ykramarz@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1125Records found

CVE-2017-6657
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.53%
||
7 Day CHG~0.00%
Published-16 May, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Sourcefire Snort 3.0 before build 233 mishandles Ether Type Validation. Since valid ether type and IP protocol numbers do not overlap, Snort++ stores all protocol decoders in a single array. That makes it possible to craft packets that have IP protocol numbers in the ether type field which will confuse the Snort++ decoder. For example, an eth:llc:snap:icmp6 packet will cause a crash because there is no ip6 header with which to calculate the icmp6 checksum. Affected decoders include gre, llc, trans_bridge, ciscometadata, linux_sll, and token_ring. The fix adds a check in the packet manager to validate the ether type before indexing the decoder array. An out of range ether type will raise 116:473.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-snort\+\+Snort 3.0 All versions prior to build 233.
CVE-2008-3813
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.26% / 79.40%
||
7 Day CHG~0.00%
Published-26 Sep, 2008 | 16:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when the L2TP mgmt daemon process is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted L2TP packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CVE-2017-3862
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.68% / 71.67%
||
7 Day CHG~0.00%
Published-20 Apr, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCuu76493.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-3808
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.54% / 67.71%
||
7 Day CHG~0.00%
Published-20 Apr, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate limiting protection. An attacker could exploit this vulnerability by sending the affected device a high rate of SIP messages. An exploit could allow the attacker to cause the device to reload unexpectedly. The device and services will restart automatically. This vulnerability affects Cisco Unified Communications Manager (CallManager) releases prior to the first fixed release; the following list indicates the first minor release that includes the fix for this vulnerability: 10.5.2.14900-16 11.0.1.23900-5 11.5.1.12900-2. Cisco Bug IDs: CSCuz72455.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managerCisco Unified Communications Manager
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-3832
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.61% / 81.80%
||
7 Day CHG~0.00%
Published-06 Apr, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the GUI web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition. This vulnerability affects only the Cisco Wireless LAN Controller 8.3.102.0 release. Cisco Bug IDs: CSCvb48198.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-wireless_lan_controllerwireless_lan_controller_firmwareCisco Wireless LAN Controller
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CWE ID-CWE-264
Not Available
CVE-2017-3859
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.34% / 57.01%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the DHCP code for the Zero Touch Provisioning feature of Cisco ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a format string vulnerability when processing a crafted DHCP packet for Zero Touch Provisioning. An attacker could exploit this vulnerability by sending a specially crafted DHCP packet to an affected device. An exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco ASR 920 Series Aggregation Services Routers that are running an affected release of Cisco IOS XE Software (3.13 through 3.18) and are listening on the DHCP server port. By default, the devices do not listen on the DHCP server port. Cisco Bug IDs: CSCuy56385.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asr-920-12sz-imasr-920-12cz-dios_xeasr-920-24sz-masr-920-4sz-dasr-920-24sz-imasr-920-24tz-masr-920-12cz-aasr-920-4sz-aCisco IOS XE Software for Cisco ASR 920 Series Routers
CWE ID-CWE-134
Use of Externally-Controlled Format String
CVE-2017-3864
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.12% / 78.30%
||
7 Day CHG~0.00%
Published-22 Mar, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the DHCP client implementation of Cisco IOS (12.2, 12.4, and 15.0 through 15.6) and Cisco IOS XE (3.3 through 3.7) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability occurs during the parsing of a crafted DHCP packet. An attacker could exploit this vulnerability by sending crafted DHCP packets to an affected device that is configured as a DHCP client. A successful exploit could allow the attacker to cause a reload of an affected device, resulting in a DoS condition. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or IOS XE Software and using a specific DHCP client configuration. Cisco Bug IDs: CSCuu43892.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-399
Not Available
CVE-2017-3826
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.87%
||
7 Day CHG~0.00%
Published-01 Mar, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) with software before 1.1(1a) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI. The following Cisco NetFlow Generation Appliances are vulnerable: NGA 3140, NGA 3240, NGA 3340. Cisco Bug IDs: CSCvc83320.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-netflow_generation_appliance_softwarenetflow_generation_appliance_3240netflow_generation_appliance_3340netflow_generation_appliance_3140Cisco NetFlow Generation Appliance
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-3825
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.42% / 61.94%
||
7 Day CHG~0.00%
Published-16 May, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the ICMP ingress packet processing of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause the TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation for the size of a received ICMP packet. An attacker could exploit this vulnerability by sending a crafted ICMP packet to the local IP address of the targeted endpoint. A successful exploit could allow the attacker to cause a DoS of the TelePresence endpoint, during which time calls could be dropped. This vulnerability would affect either IPv4 or IPv6 ICMP traffic. This vulnerability affects the following Cisco TelePresence products when running software release CE8.1.1, CE8.2.0, CE8.2.1, CE8.2.2, CE 8.3.0, or CE8.3.1: Spark Room OS, TelePresence DX Series, TelePresence MX Series, TelePresence SX Quick Set Series, TelePresence SX Series. Cisco Bug IDs: CSCvb95396.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_tctelepresence_ceCisco TelePresence
CWE ID-CWE-20
Improper Input Validation
CVE-2017-3830
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.63% / 70.36%
||
7 Day CHG~0.00%
Published-22 Feb, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in an internal API of the Cisco Meeting Server (CMS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected appliance. More Information: CSCvc89678. Known Affected Releases: 2.1. Known Fixed Releases: 2.1.2.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-meeting_serverCisco Meeting Server
CWE ID-CWE-20
Improper Input Validation
CVE-2017-3860
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.68% / 71.67%
||
7 Day CHG~0.00%
Published-20 Apr, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosios_xeCisco IOS and IOS XE
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-12219
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.38% / 80.29%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the handling of IP fragments for the Cisco Small Business SPA300, SPA500, and SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to the inability to handle many large IP fragments for reassembly in a short duration. An attacker could exploit this vulnerability by sending a crafted stream of IP fragments to the targeted device. An exploit could allow the attacker to cause a DoS condition when the device unexpectedly reloads. Cisco Bug IDs: CSCve82586.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-spa_514gspa_502g_firmwarespa_504g_firmwarespa_501gspa_512g_firmwarespa_502gspa_500sspa_303_firmwarespa_301_firmwarespa_501g_firmwarespa_508gspa_514g_firmwarespa_301spa_509gspa_303spa_500ds_firmwarespa_500s_firmwarespa_509g_firmwarespa_504gspa_512gspa_500dsspa_508g_firmwareCisco Small Business SPA300, SPA500, and SPA51x Series IP Phones
CWE ID-CWE-399
Not Available
CVE-2017-12215
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.1||HIGH
EPSS-0.89% / 75.56%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Email Security Appliance
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12234
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-6.54% / 91.16%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-12 Jan, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc43709.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-1802_integrated_service_router1100-4gltegb_integrated_services_router1131_integrated_services_router1117-4plteeawe1861_integrated_service_router1101-4p_integrated_services_router1100-4g_integrated_services_routerios1116-4pwe1117-4pmwe1921_integrated_services_router1117-4pwe1801_integrated_service_router1111x-8p1100-6g_integrated_services_router1841_integrated_service_routercatalyst_ie93001100-4p_integrated_services_router1000_integrated_services_router1120esr-6300-ncp-k9esr-6300-con-k91160_integrated_services_router1100-8p_integrated_services_router1100-8p1803_integrated_service_router1116-4plteeawecatalyst_ie3300_rugged_switch1120_connected_grid_router1100-lte_integrated_services_router1117-4pmlteeawe1941_integrated_services_router1111-8pwbcatalyst_ie3400_heavy_duty_switch1111-4pwe1113-8pmwecatalyst_ie3200_rugged_switch1811_integrated_service_router1905_integrated_services_routercatalyst_ie3400_rugged_switch1100-4p1100_terminal_services_gateways1109-4p1109-2p1101-4p1906c_integrated_services_router1100_integrated_services_router1113-8plteeawe1812_integrated_service_router1100-4g\/6g_integrated_services_router1101_integrated_services_router1100-4gltena_integrated_services_router1113-8pwe1120_integrated_services_router1941w_integrated_services_routerCisco IOSIOS software
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12237
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-5.32% / 90.05%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-12 Jan, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_9300-48uxm-ecatalyst_3650-48ts-ecatalyst_3850-48xs-f-s4321_integrated_services_routercatalyst_9300-24s-e1101-4p_integrated_services_routercatalyst_3650-48tq-ecatalyst_3850-24t-scatalyst_3850-16xs-scatalyst_8500catalyst_3650-24ts-ecatalyst_3650-24pdmcatalyst_3650-24td-l1841_integrated_service_routercatalyst_8500-4qccatalyst_9300-48t-ecatalyst_ie9300catalyst_3650-48fs-lcatalyst_8300-1n1s-4t2xcatalyst_3650-12x48fd-scatalyst_9300-24s-acatalyst_3850-48p-lcatalyst_9410rcatalyst_8300-2n2s-6tcatalyst_3850-24t-e8800_12-slotcatalyst_3650-48pd-scatalyst_3650-48ts-lasr_10011111x_integrated_services_router4351\/k9-rf_integrated_services_router4331\/k9_integrated_services_router8101-32fhcatalyst_3850-24xs-s1100-4gltena_integrated_services_router1120_integrated_services_routercatalyst_3850-24xucatalyst_9300-24ux-acatalyst_9300catalyst_3850-24p-ecatalyst_8200catalyst_3850-24xs-e1100-4gltegb_integrated_services_routercatalyst_9300l_stack1109-4p_integrated_services_routercatalyst_3650-8x24pd-lcatalyst_8510msrcatalyst_3650-48ts-s8202catalyst_3650-12x48uq-ecatalyst_8300catalyst_3650-48fs-scatalyst_9300l-48p-4x-ecatalyst_8300-1n1s-6t1803_integrated_service_routercatalyst_3850-48f-ecatalyst_3650-12x48uq-l1811_integrated_service_routercatalyst_3650-48td-s4000_integrated_services_routercatalyst_3850-nm-8-10g4321\/k9-ws_integrated_services_router8800_4-slotcatalyst_3850-12x48u1100_integrated_services_routercatalyst_3850-48f-s1101_integrated_services_routercatalyst_9600_supervisor_engine-11802_integrated_service_routercatalyst_9300l-24t-4x-ecatalyst_3850-48xs-ecatalyst_9300lmcatalyst_9300l-24p-4x-acatalyst_3650-24pd-lcatalyst_3650-48fd-l1240_connected_grid_routerasr_1002-x_rcatalyst_3650-24ts-lcatalyst_9500catalyst_9500hcatalyst_3650-24pd-e1111x-8p_integrated_services_routercatalyst_98001801_integrated_service_routercatalyst_9300xasr_1001-x_r1000_integrated_services_routercatalyst_3650-48fq-ecatalyst_3650-24ts-s4321\/k9_integrated_services_routercatalyst_3650-48tq-lcatalyst_3650-12x48ur-lcatalyst_9800-l-fcatalyst_ie3200_rugged_switchcatalyst_3650-12x48fd-ecatalyst_9300-48uxm-acatalyst_ie3400_rugged_switchcatalyst_3850-24xu-e4331\/k9-ws_integrated_services_router8101-32hcatalyst_3850-48u-lasr_1001-xcatalyst_9300-48u-aasr_10134351_integrated_services_routercatalyst_3650-8x24uq-sasr_1023catalyst_3850-48u-ecatalyst_3850-24u-ecatalyst_3650-8x24pd-scatalyst_9300l-48t-4x-acatalyst_9300-48s-e820844461_integrated_services_routercatalyst_9600catalyst_9300-24p-a4431_integrated_services_routercatalyst_3850-24ucatalyst_3850-24s-scatalyst_9300-48s-acatalyst_3650-12x48urcatalyst_3650-12x48uqcatalyst_8500lcatalyst_3650-48fqm-scatalyst_9300-48un-acatalyst_3850-24u-scatalyst_9300l-48p-4g-ecatalyst_3850-24pw-scatalyst_3650-24pdm-s1100-4p_integrated_services_routercatalyst_8300-2n2s-4t2x9800-lcatalyst_9300-48un-easr_1006-xcatalyst_3850-24t-lasr_1002-hx_rcatalyst_9300l-24t-4g-acatalyst_3850catalyst_9300l-24p-4x-ecatalyst_3650-12x48ur-ecatalyst_9300l-48p-4g-a1100-lte_integrated_services_routerios_xecatalyst_3650-48td-lcatalyst_3650-48fd-e4461_integrated_services_routercatalyst_9200cx8804catalyst_3650-48fq-s8831catalyst_9300-24t-ecatalyst_9300l-24p-4g-acatalyst_3650-8x24uq-l1100-4g\/6g_integrated_services_routercatalyst_9407r4221_integrated_services_routercatalyst_9200catalyst_3650-12x48uq-scatalyst_3850-24xscatalyst_3650-48pq-lcatalyst_3650-12x48uz-scatalyst_9200lcatalyst_3650-24pdcatalyst_3650-48td-e4331\/k9-rf_integrated_services_routercatalyst_3650-48fqm-ecatalyst_3850-24xu-scatalyst_9300l-24p-4g-ecatalyst_3650-24pdm-l1100-4g_integrated_services_routercatalyst_3650-48tq-scatalyst_3650-24td-ecatalyst_3850-24p-s9800-40catalyst_3850-12s-scatalyst_3850-24xu-lcatalyst_9300l-48t-4g-ecatalyst_9400_supervisor_engine-1esr-6300-con-k91160_integrated_services_router1100-8p_integrated_services_router4331_integrated_services_routercatalyst_8540csrcatalyst_3650-24pd-scatalyst_ie3300_rugged_switchcatalyst_9300-48u-ecatalyst_3850-48u-scatalyst_3650-12x48uzcatalyst_3850-16xs-e1905_integrated_services_router4351\/k9_integrated_services_router8800_8-slotcatalyst_3650-8x24uq-ecatalyst_3650-48pd-ecatalyst_3850-48f-lcatalyst_9300l-24t-4x-a4451_integrated_services_router1906c_integrated_services_router8201-32fhcatalyst_3850-48xs-f-ecatalyst_3850-nm-2-40gcatalyst_3850-12s-ecatalyst_3650-24ps-lcatalyst_9300-48p-acbr-8_converged_broadband_router1861_integrated_service_router8812catalyst_3850-48xs-scatalyst_3850-32xs-sioscatalyst_3650-24ps-scatalyst_9800-l-c9800-801100-6g_integrated_services_routercatalyst_3850-48pw-scatalyst_9300-24ux-e8212catalyst_9300l-24t-4g-e8201catalyst_3650-48fqmcatalyst_3650-24pdm-ecatalyst_3850-48ucatalyst_3650-12x48fd-lcatalyst_3850-48p-ecatalyst_3650-12x48uz-ecatalyst_3850-48t-lcatalyst_9300-48t-acatalyst_3850-48t-scatalyst_9300-24t-a1812_integrated_service_routercatalyst_3850-24u-lcatalyst_9300-48p-ecatalyst_9300l-48t-4g-acatalyst_9300-24u-ecatalyst_3650-48fs-e1941w_integrated_services_router1109-2p_integrated_services_routercatalyst_3850-24s-easr_1002asr_1000-xasr_1001-hxcatalyst_9300lcatalyst_3850-12xs-scatalyst_3850-48t-e4321\/k9-rf_integrated_services_router8808catalyst_3650-48fqcatalyst_9800-clcatalyst_3650-48fq-l8102-64hcatalyst_3650-48fd-scatalyst_3650-48pq-scatalyst_3650-8x24uqintegrated_services_virtual_routercatalyst_3650-12x48ur-s422_integrated_services_routerasr_1009-xesr63008800_18-slot9800-clasr_1004catalyst_3650-8x24pd-ecatalyst_3650-48ps-scatalyst_9300-24p-ecatalyst_3850-32xs-ecatalyst_9600xcatalyst_3850-12xs-ecatalyst_3850-48p-s4451-x_integrated_services_router1131_integrated_services_routercatalyst_3650-48pd-lcatalyst_9800-l8818catalyst_3650-24ps-ecatalyst_3650catalyst_3650-48pq-ecatalyst_3650-48ps-lcatalyst_3850-48xscatalyst_3850-24p-l1921_integrated_services_routerasr_1002-hx82181109_integrated_services_routeresr-6300-ncp-k9asr_1001-hx_rcatalyst_9300l-48t-4x-ecatalyst_3650-12x48uz-l1941_integrated_services_routerasr_1006catalyst_9300-24u-acatalyst_8510csrcatalyst_ie3400_heavy_duty_switchasr_1000catalyst_3650-24td-sasr_1002-xcatalyst_3650-48fqm-lcatalyst_3650-48ps-e4351\/k9-ws_integrated_services_routercatalyst_8540msrcatalyst_9400catalyst_9300l-48p-4x-aCisco IOS and IOS XEIOS and IOS XE Software
CVE-2017-12280
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.64% / 70.64%
||
7 Day CHG~0.00%
Published-02 Nov, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) Discovery Request parsing functionality of Cisco Wireless LAN Controllers could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of fields in CAPWAP Discovery Request packets by the affected device. An attacker could exploit this vulnerability by sending crafted CAPWAP Discovery Request packets to an affected device. A successful exploit could allow the attacker to cause the affected device to restart unexpectedly, resulting in a DoS condition. Cisco Bug IDs: CSCvb95842.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-wireless_lan_controllerwireless_lan_controller_softwareCisco Wireless LAN Controller
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-12259
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.41% / 80.51%
||
7 Day CHG~0.00%
Published-19 Oct, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of Session Initiation Protocol (SIP) functionality in Cisco Small Business SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending malformed SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. This vulnerability affects Cisco Small Business SPA51x Series IP Phones that are running Cisco SPA51x Firmware Release 7.6.2SR1 or earlier. Cisco Bug IDs: CSCvc63982.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-small_business_ip_phonesmall_business_ip_phone_firmwareCisco Small Business SPA51x Series IP Phones
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-12246
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-3.29% / 87.22%
||
7 Day CHG~0.00%
Published-05 Oct, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of the direct authentication feature in Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of the HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to the local IP address of an affected device. A successful exploit could allow the attacker to cause the affected device to reload. This vulnerability affects Cisco Adaptive Security Appliance (ASA) Software that is running on the following Cisco products: ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, ISA 3000 Industrial Security Appliance. Cisco Bug IDs: CSCvd59063.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwareCisco Adaptive Security Appliance Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-399
Not Available
CVE-2017-12270
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.89% / 75.55%
||
7 Day CHG~0.00%
Published-05 Oct, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the gRPC code of Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the emsd service stops. The vulnerability is due to the software's inability to process HTTP/2 packets. An attacker could exploit this vulnerability by sending a malformed HTTP/2 frame to the affected device. A successful exploit could allow the attacker to create a DoS condition when the emsd service stops. Cisco Bug IDs: CSCvb99388.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ios_xrCisco IOS XR
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-3816
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.19% / 78.88%
||
7 Day CHG~0.00%
Published-23 Oct, 2008 | 21:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2(4)9 and 7.2(4)10 allows remote attackers to cause a denial of service (device reload) via a crafted IPv6 packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_5500_seriespix_security_appliancen/a
CVE-2017-12260
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.41% / 80.51%
||
7 Day CHG~0.00%
Published-19 Oct, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the implementation of Session Initiation Protocol (SIP) functionality in Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of SIP request messages by an affected device. An attacker could exploit this vulnerability by using formatted specifiers in a SIP payload that is sent to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. This vulnerability affects Cisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones that are running firmware release 7.6.2SR1 or earlier. Cisco Bug IDs: CSCvc63986.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-spa_514gspa_504g_firmwarespa_502g_firmwarespa_501gspa_502gspa_512g_firmwarespa_508gspa_501g_firmwarespa_514g_firmwarespa_509gspa_525g_firmwarespa_509g_firmwarespa_504gspa_512gspa_525gspa_508g_firmwareCisco Small Business SPA50x, SPA51x, and SPA52x Series IP Phones
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-0385
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-2.14% / 84.23%
||
7 Day CHG~0.00%
Published-29 Mar, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Smart Install feature in Cisco IOS 12.2, 15.0, 15.1, and 15.2 allows remote attackers to cause a denial of service (device reload) by sending a malformed Smart Install message over TCP, aka Bug ID CSCtt16051.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-12231
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-6.80% / 91.35%
||
7 Day CHG~0.00%
Published-28 Sep, 2017 | 07:00
Updated-14 Jan, 2026 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_3650-24pd-ecatalyst_9300l-48t-4g-ecatalyst_3650-48ps-scatalyst_3650-48fd-ecatalyst_3650-48td-scatalyst_3650-24ts-ecatalyst_3850-12xs-ecatalyst_9300l-24p-4x-aasr_1001-xasr_1013catalyst_3850-48u-sasr_914catalyst_3650-48pq-scatalyst_3650-48fqm1802_integrated_service_routercatalyst_3650-24ps-lcatalyst_9300l-24t-4g-ecatalyst_3650-12x48uzasr_1009-xasr_920-24sz-im1906c_integrated_services_routercatalyst_3650-48fq-s1111x-8p_integrated_services_routercatalyst_9300-48p-acatalyst_3850catalyst_3850-48xs1109_integrated_services_router8101-32fhcatalyst_3850-24xu-scatalyst_9300l-24t-4x-easr_901-6cz-f-dcatalyst_9300-48p-ecatalyst_3850-24p-lcatalyst_3650-24td-easr_900catalyst_9300-48uxm-acatalyst_3850-12s-scatalyst_3850-16xs-ecatalyst_3850-48f-lcatalyst_9300l-48p-4x-acatalyst_3650-48tq-lcatalyst_3650-8x24pd-easr_920-4sz-d_rcatalyst_3650-12x48uz-lcatalyst_9300-48t-aasr_90108800_12-slot8800_8-slotcatalyst_8510msrcatalyst_9800-l-casr_901s-3sg-f-dasr_1006catalyst_3650-24pdm-ecatalyst_8300-2n2s-4t2xcatalyst_8300-1n1s-4t2xcatalyst_3850-24u-lcatalyst_3850-24xs-ecatalyst_3850-24pw-s8804catalyst_3850-24xucatalyst_3650-24ps-scatalyst_3850-48t-sasr_9006asr_1002-hx_rcatalyst_3650asr_1000-esp200-xcatalyst_3650-48pq-ecatalyst_3650-48fqm-lcatalyst_3850-12xs-sasr_1002_fixed_routercatalyst_3650-48td-e4000_integrated_services_routercatalyst_3850-48ucatalyst_3650-48fq-lcatalyst_3850-32xs-scatalyst_3850-48xs-ecatalyst_3850-24u-e8800_18-slotasr_9902catalyst_3850-48xs-f-sasr_901-4c-ft-dcatalyst_3650-8x24uq-scatalyst_3650-48fs-scatalyst_9300lasr_903asr_9910catalyst_3850-24xs1131_integrated_services_router111x_integrated_services_router1109-4p_integrated_services_router1803_integrated_service_routercatalyst_9300-24u-acatalyst_3650-12x48uq-sasr_1000-esp100-xcatalyst_3850-24u4221_integrated_services_routercatalyst_3650-8x24uq-easr_920-4sz-dasr_901-6cz-fs-acatalyst_9300-48s-ecatalyst_8500lcatalyst_3650-48ps-lcatalyst_9300-48t-ecatalyst_9800asr_901-6cz-fs-d8218catalyst_3850-48pw-scatalyst_3850-12x48uasr_1000-esp100asr_9904asr_920-12sz-imcatalyst_3650-12x48ur-scatalyst_9300-48un-aasr_1001-hxcatalyst_3650-24td-lasr_920-24tz-mcatalyst_8200catalyst_3650-48fq-ecatalyst_3850-48xs-sasr_9920catalyst_9800-401100-4gltena_integrated_services_routercatalyst_3850-24p-ecatalyst_3850-24s-scatalyst_3850-24s-e8812catalyst_3650-12x48ur-lcatalyst_3850-48u-l9800-408102-64hasr_920-24sz-masr_1002-xasr_920-4sz-acatalyst_3650-12x48fd-scatalyst_9300l-48t-4x-ecatalyst_3650-48fs-lcatalyst_3850-nm-2-40gasr_9906catalyst_3650-12x48uq-lasr_9000vcatalyst_3650-24pdmcatalyst_3650-24pdm-scatalyst_3850-48t-lcatalyst_9300-24t-acatalyst_3650-12x48uq-ecatalyst_9300-48u-acatalyst_8500-4qccatalyst_8510csr8201catalyst_9800_embedded_wireless_controllerasr_901-6cz-f-acatalyst_3650-48fqm-e1100-8p_integrated_services_routercatalyst_3650-48tq-s88081100-4p_integrated_services_routercatalyst_3650-24td-sasr_901-12c-f-dcatalyst_3650-24ts-s8202asr_9922catalyst_85009800-lcatalyst_3650-24pdm-lcatalyst_3650-48tq-easr_920-24sz-m_rasr_10011100-4gltegb_integrated_services_routercatalyst_3650-12x48urasr_901s-4sg-f-dcatalyst_9800-l-fcatalyst_3850-16xs-scatalyst_9600_supervisor_engine-1catalyst_9600catalyst_3650-12x48uz-ecatalyst_3650-24ts-lcatalyst_3650-12x48fd-l1120_integrated_services_routercatalyst_3850-48f-scatalyst_3850-24xs-scatalyst_9300l-48t-4x-acatalyst_3650-8x24uqcatalyst_9200lcatalyst_3850-48t-e1801_integrated_service_routerasr_99121100_terminal_services_gatewayscatalyst_9300l-24p-4x-ecatalyst_9300l-48p-4g-ecatalyst_3850-48f-easr_920-10sz-pd_rcatalyst_9300-24p-ecatalyst_3650-8x24uq-lcatalyst_3650-48pd-s9800-80catalyst_9800-801941_integrated_services_routercatalyst_8300asr_901-12c-ft-dasr_1004catalyst_9300l-48p-4x-ecatalyst_3850-48p-lcatalyst_9300-24t-ecatalyst_3850-24t-e1921_integrated_services_routercatalyst_3650-24pdasr_1000catalyst_3650-48ts-scatalyst_3650-48pd-ecatalyst_3850-nm-8-10gcatalyst_9200catalyst_3650-24ps-ecatalyst_3650-48ts-lcatalyst_9300l-24t-4g-aios1100-4g\/6g_integrated_services_router9800-clcatalyst_3850-24xu-lcatalyst_3650-8x24pd-lcatalyst_9800-40_wireless_controllercatalyst_3850-12s-e1861_integrated_service_router1905_integrated_services_routercatalyst_9300asr_9000catalyst_3650-24pd-scatalyst_ie3200_rugged_switch8101-32hcatalyst_9300-24u-easr_1001-x_rcatalyst_3650-48fqcatalyst_9300-48un-easr_901s-3sg-f-ahasr_9903catalyst_9300-24s-ecatalyst_9300lmcatalyst_9300l-24p-4g-acatalyst_ie3300_rugged_switch1160_integrated_services_router8212asr_90011100_integrated_services_routerasr_902ucatalyst_3650-48pd-lcatalyst_9300-24ux-acatalyst_9300l_stackasr_902catalyst_9200cxcatalyst_9800-clasr_1001-hx_rcatalyst_3850-48p-sasr_920-12sz-im_rcatalyst_3850-48p-ecatalyst_3650-48fqm-scatalyst_3650-12x48uqcatalyst_3650-8x24pd-scatalyst_3650-48fs-ecatalyst_3850-48u-ecatalyst_3650-48fd-lcatalyst_9300-24p-aasr_1002-hx1100-6g_integrated_services_routercatalyst_8300-2n2s-6tcatalyst_3850-32xs-ecatalyst_9300-48uxm-easr_9901catalyst_3650-24pd-l1100-4g_integrated_services_routerasr_920-10sz-pdasr_920-24sz-im_rasr_920-24tz-m_rasr_901-6cz-ft-d8800_4-slotcatalyst_3850-24t-scatalyst_8540msrcatalyst_9300l-24t-4x-acatalyst_3850-24xu-e1109-2p_integrated_services_routercatalyst_3850-24t-lcatalyst_8300-1n1s-6tasr_901-4c-f-d1841_integrated_service_routerasr_920-12cz-acatalyst_9500hasr_1023catalyst_9300x8208asr_901-6cz-ft-acatalyst_9800-80_wireless_controller1100-lte_integrated_services_routercatalyst_3850-24u-sasr_920-4sz-a_rcatalyst_3850-24p-sasr_901s-2sg-f-ahcatalyst_3650-12x48fd-easr_920-12cz-a_rcatalyst_9300-48u-ecatalyst_9300l-48t-4g-a1101_integrated_services_router1812_integrated_service_routerasr_901s-2sg-f-d1101-4p_integrated_services_routerasr_1002-x_rcatalyst_9600xcatalyst_9800-lcatalyst_3650-48fd-s8201-32fhcatalyst_3850-48xs-f-ecatalyst_9300l-48p-4g-aasr_920u-12sz-imcatalyst_3650-12x48ur-ecatalyst_9300-48s-acatalyst_8540csrasr_1006-x1941w_integrated_services_routercatalyst_9300-24s-a8818asr_907asr_920-12cz-d_rcatalyst_9300l-24p-4g-ecatalyst_9500catalyst_3650-48ts-ecatalyst_9300-24ux-e1811_integrated_service_routercatalyst_3650-12x48uz-scatalyst_3650-48ps-ecatalyst_3650-48td-lasr_920-12cz-dcatalyst_3650-48pq-lCisco IOSIOS software
CVE-2019-1900
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.39%
||
7 Day CHG~0.00%
Published-21 Aug, 2019 | 18:20
Updated-19 Nov, 2024 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Integrated Management Controller Unauthenticated Denial of Service Vulnerability

A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to cause the web server process to crash, causing a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient validation of user-supplied input on the web interface. An attacker could exploit this vulnerability by submitting a crafted HTTP request to certain endpoints of the affected software. A successful exploit could allow an attacker to cause the web server to crash. Physical access to the device may be required for a restart.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ucs_c125_m5ucs_s3260integrated_management_controller_supervisorucs_c4200unified_computing_systemCisco Unified Computing System (Management Software)
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2008-2058
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.80% / 74.12%
||
7 Day CHG~0.00%
Published-04 Jun, 2008 | 21:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-pix_security_applianceadaptive_security_appliance_softwaren/a
CWE ID-CWE-399
Not Available
CVE-2008-2056
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.92% / 83.37%
||
7 Day CHG~0.00%
Published-04 Jun, 2008 | 21:00
Updated-07 Aug, 2024 | 08:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 and 8.1.x before 8.1(1)1 allows remote attackers to cause a denial of service (device reload) via a crafted Transport Layer Security (TLS) packet to the device interface.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliancepix_security_applianceadaptive_security_appliance_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-0369
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.43% / 62.38%
||
7 Day CHG~0.00%
Published-01 Mar, 2012 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-2500_wireless_lan_controller4100_wireless_lan_controller4402_wireless_lan_controller2125_wireless_lan_controller2504_wireless_lan_controllerwireless_lan_controller_software2106_wireless_lan_controller2000_wireless_lan_controller2112_wireless_lan_controller2100_wireless_lan_controller5508_wireless_controller4404_wireless_lan_controller4400_wireless_lan_controllern/a
CVE-2008-2732
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.59% / 69.17%
||
7 Day CHG~0.00%
Published-04 Sep, 2008 | 16:00
Updated-07 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in the SIP inspection functionality in Cisco PIX and Adaptive Security Appliance (ASA) 5500 devices 7.0 before 7.0(7)16, 7.1 before 7.1(2)71, 7.2 before 7.2(4)7, 8.0 before 8.0(3)20, and 8.1 before 8.1(1)8 allow remote attackers to cause a denial of service (device reload) via unknown vectors, aka Bug IDs CSCsq07867, CSCsq57091, CSCsk60581, and CSCsq39315.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-pixadaptive_security_appliance_5500n/a
CVE-2008-1744
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.04% / 77.49%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Certificate Authority Proxy Function (CAPF) service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR7, 4.2 before 4.2(3)SR4, and 4.3 before 4.3(2) allows remote attackers to cause a denial of service (service crash) via malformed network traffic, aka Bug ID CSCsk46770.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_callmanagerunified_communications_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1740
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.92% / 83.37%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Presence Engine (PE) service in Cisco Unified Presence before 6.0(1) allows remote attackers to cause a denial of service (core dump and service interruption) via an unspecified "stress test," aka Bug ID CSCsh20972.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_presencen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1748
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-2.17% / 84.35%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Communications Manager 4.1 before 4.1(3)SR7, 4.2 before 4.2(3)SR4, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) does not properly validate SIP URLs, which allows remote attackers to cause a denial of service (service interruption) via a SIP INVITE message, aka Bug ID CSCsl22355.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1745
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.92% / 83.37%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Communications Manager (CUCM) 5.x before 5.1(2) and 6.x before 6.1(1) allows remote attackers to cause a denial of service (service interruption) via a SIP JOIN message with a malformed header, aka Bug ID CSCsi48115.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1741
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.98% / 76.76%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 23:25
Updated-19 Nov, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Encrypted Traffic Analytics Denial of Service Vulnerability

A vulnerability in the Cisco Encrypted Traffic Analytics (ETA) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a logic error that exists when handling a malformed incoming packet, leading to access to an internal data structure after it has been freed. An attacker could exploit this vulnerability by sending crafted, malformed IP packets to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-416
Use After Free
CVE-2019-1739
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-2.35% / 84.92%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 23:20
Updated-16 Sep, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software Network-Based Application Recognition Denial of Service Vulnerabilities

A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a parsing issue on DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through routers that are running an affected version and have NBAR enabled. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS and Cisco IOS-XE Software
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1746
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.92% / 83.37%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SNMP Trap Agent service in Cisco Unified Communications Manager (CUCM) 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (core dump and service restart) via a series of malformed UDP packets, as demonstrated by the IP Stack Integrity Checker (ISIC), aka Bug ID CSCsj24113.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-1743
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.63% / 81.90%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory leak in the Certificate Trust List (CTL) Provider service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) and 6.x before 6.1(1) allows remote attackers to cause a denial of service (memory consumption and service interruption) via a series of malformed TCP packets, aka Bug ID CSCsi98433.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-399
Not Available
CVE-2008-1747
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-2.17% / 84.35%
||
7 Day CHG~0.00%
Published-16 May, 2008 | 06:54
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Cisco Unified Communications Manager 4.1 before 4.1(3)SR6, 4.2 before 4.2(3)SR3, 4.3 before 4.3(2), 5.x before 5.1(3), and 6.x before 6.1(1) allows remote attackers to cause a denial of service (CCM service restart) via an unspecified SIP INVITE message, aka Bug ID CSCsk46944.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_communications_managern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0535
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-3.67% / 87.92%
||
7 Day CHG~0.00%
Published-22 May, 2008 | 10:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) before 3.1.6, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (device instability) via "SSH credentials that attempt to change the authentication method," aka Bug ID CSCsm14239.

Action-Not Available
Vendor-icon-labsn/aCisco Systems, Inc.
Product-service_control_engineiconfidant_sshn/a
CWE ID-CWE-255
Not Available
CVE-2008-0527
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.32% / 79.88%
||
7 Day CHG~0.00%
Published-15 Feb, 2008 | 01:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HTTP server in Cisco Unified IP Phone 7935 and 7936 running SCCP firmware allows remote attackers to cause a denial of service (reboot) via a crafted HTTP request.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-session_initiation_protocol_\(sip\)_firmwareskinny_client_control_protocol_\(sccp\)_firmwareunified_ip_phonen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0534
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-2.89% / 86.33%
||
7 Day CHG~0.00%
Published-22 May, 2008 | 10:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSH server in (1) Cisco Service Control Engine (SCE) before 3.1.6, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (device restart or daemon outage) via a high rate of login attempts, aka Bug ID CSCsi68582.

Action-Not Available
Vendor-icon-labsn/aCisco Systems, Inc.
Product-service_control_engineiconfidant_sshn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0536
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-2.67% / 85.83%
||
7 Day CHG~0.00%
Published-22 May, 2008 | 10:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) 3.0.x before 3.0.7 and 3.1.x before 3.1.0, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (management interface outage) via SSH traffic that occurs during management operations and triggers "illegal I/O operations," aka Bug ID CSCsh49563.

Action-Not Available
Vendor-icon-labsn/aCisco Systems, Inc.
Product-service_control_engineiconfidant_sshn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-3162
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.42% / 80.58%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 20:10
Updated-15 Nov, 2024 | 17:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IoT Field Network Director Denial of Service Vulnerability

A vulnerability in the Constrained Application Protocol (CoAP) implementation of Cisco IoT Field Network Director could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of incoming CoAP traffic. An attacker could exploit this vulnerability by sending a malformed CoAP packet to an affected device. A successful exploit could allow the attacker to force the CoAP server to stop, interrupting communication to the IoT endpoints.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iot_field_network_directorCisco IoT Field Network Director (IoT-FND)
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3225
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.03% / 77.38%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:42
Updated-15 Nov, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS 12.2(55)SE
CWE ID-CWE-20
Improper Input Validation
CVE-2008-0526
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.92% / 83.37%
||
7 Day CHG~0.00%
Published-15 Feb, 2008 | 01:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP firmware allows remote attackers to cause a denial of service (reboot) via a long ICMP echo request (ping) packet.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-session_initiation_protocol_\(sip\)_firmwareskinny_client_control_protocol_\(sccp\)_firmwareunified_ip_phonen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-0355
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.52% / 81.32%
||
7 Day CHG~0.00%
Published-15 Mar, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(2.11) and 8.5 before 8.5(1.4) allow remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger syslog message 305006, aka Bug ID CSCts39634.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_6513-ecatalyst_6500adaptive_security_appliance_software5500_series_adaptive_security_appliancecatalyst_6504-ecatalyst_6509-ecatalyst_6506-ecatalyst_6513catalyst_6503-ecatalyst_6509-v-ecatalyst_6509-neb-an/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-0370
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.39% / 60.31%
||
7 Day CHG~0.00%
Published-01 Mar, 2012 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-2500_wireless_lan_controller4100_wireless_lan_controller4402_wireless_lan_controller2125_wireless_lan_controller2504_wireless_lan_controllerwireless_lan_controller_software2106_wireless_lan_controller2000_wireless_lan_controller2112_wireless_lan_controller2100_wireless_lan_controller5508_wireless_controller4404_wireless_lan_controller4400_wireless_lan_controllern/a
CVE-2007-5584
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.48% / 81.03%
||
7 Day CHG~0.00%
Published-20 Dec, 2007 | 02:00
Updated-07 Aug, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.2(3) allows remote attackers to cause a denial of service (device reload) via crafted "data in the control-plane path with Layer 7 Application Inspections."

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firewall_services_modulecatalyst_65007600_routern/a
CVE-2007-5537
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.48% / 81.03%
||
7 Day CHG~0.00%
Published-18 Oct, 2007 | 00:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Communications Manager (CUCM, formerly CallManager) 5.1 before 5.1(2), and Unified CallManager 5.0, allow remote attackers to cause a denial of service (kernel panic) via a flood of SIP INVITE messages to UDP port 5060, which triggers resource exhaustion, aka CSCsi75822.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_callmanagerunified_communications_managern/a
CWE ID-CWE-399
Not Available
CVE-2007-4789
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.26% / 79.46%
||
7 Day CHG~0.00%
Published-10 Sep, 2007 | 21:00
Updated-07 Aug, 2024 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Content Switching Modules (CSM) 4.2 before 4.2.7, and Cisco Content Switching Module with SSL (CSM-S) 2.1 before 2.1.6, when service termination is enabled, allow remote attackers to cause a denial of service (reboot) via unspecified vectors related to high network utilization, aka CSCsh57876.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-content_switching_modulescontent_switching_module_with_ssln/a
CWE ID-CWE-16
Not Available
CVE-2016-6356
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.76% / 73.38%
||
7 Day CHG~0.00%
Published-28 Oct, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. More Information: CSCuz63143. Known Affected Releases: 8.5.7-042 9.7.0-125. Known Fixed Releases: 10.0.0-125 9.1.1-038 9.7.2-047.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-email_security_applianceCisco AsyncOS through 9.7.0-125
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 22
  • 23
  • Next
Details not found