fkie_cve-2009-0634
Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2024-11-21 01:00
Severity ?
Summary
Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.
References
psirt@cisco.comhttp://secunia.com/advisories/34438Vendor Advisory
psirt@cisco.comhttp://securitytracker.com/id?1021898
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
psirt@cisco.comhttp://www.securityfocus.com/bid/34241
psirt@cisco.comhttp://www.vupen.com/english/advisories/2009/0851Vendor Advisory
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49424
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/49585
psirt@cisco.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34438Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1021898
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34241
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49424
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49585
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
              "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
              "matchCriteriaId": "D8FC7948-B922-486E-9E5F-069B930EB1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
              "matchCriteriaId": "475EABCF-7404-4B65-9B29-E35C7D673B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
              "matchCriteriaId": "7D99C07D-4EE3-4057-8E76-3468C45B4A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
              "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
              "matchCriteriaId": "372582DB-DAB8-4B57-A778-5E2BC35B8233",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
              "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
              "matchCriteriaId": "36CF94C8-D6FE-4229-86F4-AF503F950151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
              "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
              "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
              "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
              "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
              "matchCriteriaId": "A19FD313-0AF6-43E1-9FCB-5D27A18C8C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
              "matchCriteriaId": "CBC11203-84FD-4F6C-8597-573FD784C68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
              "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
              "matchCriteriaId": "0F894B6F-9061-4D5B-A7F9-C9DDF2DD35D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
              "matchCriteriaId": "39BB1F5B-9D53-4DEC-8FC7-C9FC7B51C862",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
              "matchCriteriaId": "5A124BB0-EFC3-430E-89F9-FF49B4BF9A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
              "matchCriteriaId": "A0515E7C-E3A5-44F4-866F-283E43AE8654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
              "matchCriteriaId": "1A74B4D0-939B-4FF1-9163-86FF64DB368E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
              "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
              "matchCriteriaId": "463C3A96-F8B7-4117-8CB3-D15B44119AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
              "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
              "matchCriteriaId": "48ABA40D-DE49-4B20-AFA1-302EB93719FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
              "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
              "matchCriteriaId": "0B0B18B6-FF50-48BE-8250-14E57FB73AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
              "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
              "matchCriteriaId": "0ED386B6-3C75-41C3-8206-9CBA14E20B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
              "matchCriteriaId": "989581B0-FC28-457B-BDD2-72ED65BBE51E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
              "matchCriteriaId": "EF8A8C95-2DC3-47AB-BED3-7D33902440C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
              "matchCriteriaId": "B8920235-87C6-41D6-9497-CC12D18A6536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
              "matchCriteriaId": "9752CFFC-F1DA-4122-ACD8-79CB963F485F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
              "matchCriteriaId": "7012F8E0-2256-448A-9C4D-E2DB5AB9852B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
              "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
              "matchCriteriaId": "5B44691F-A47B-4953-BAC9-B2D43F4BCC06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
              "matchCriteriaId": "8910F02B-DF61-443B-A4B5-2C0C04484519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
              "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
              "matchCriteriaId": "045B4782-6CE2-40DD-A9F0-16E0C25768FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
              "matchCriteriaId": "9009E0C3-8BBC-4928-8528-62DA1ADC8BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
              "matchCriteriaId": "5FE4985F-2C87-4532-9D11-9BA37B7D6A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
              "matchCriteriaId": "9A80C51F-C69A-4780-8AE9-BEBC8EBFA115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
              "matchCriteriaId": "416B8D2F-0B11-4074-B6BD-2E97F79B5520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
              "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
              "matchCriteriaId": "29B39978-3BD0-40A8-93AE-EF40042EB7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
              "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
              "matchCriteriaId": "4A2784C6-588A-4CAC-9362-515FB070D21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
              "matchCriteriaId": "93580300-6B1F-4D21-A51E-B781E234217D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
              "matchCriteriaId": "28E2C53A-51B0-4BD6-869E-1554B0BD3A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
              "matchCriteriaId": "DB3BA487-727D-416C-80C6-C2F90D52E149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
              "matchCriteriaId": "A73738DE-E81B-4226-ABA3-B54A5AD96389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
              "matchCriteriaId": "F2DA9F41-FBD0-404A-8C6B-E827C3FACE81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1DA86-E0C2-4EDF-B82C-6677516CF1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
              "matchCriteriaId": "8E2376E9-D7F4-4483-AB13-8840EA9A63E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
              "matchCriteriaId": "473A31DD-A0DC-4716-B98E-D2926A26DAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
              "matchCriteriaId": "C9569DC5-9803-4B17-9FF1-5BDA8194FE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
              "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
              "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
              "matchCriteriaId": "68C9DDEB-EDE8-4B0D-A347-32621CCEDE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
              "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
              "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
              "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
              "matchCriteriaId": "3EB012E7-E2E0-4F9D-ADF9-827816E3E6D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
              "matchCriteriaId": "B7368529-518E-4DB2-B291-1F0009445D01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
              "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F5D70-6790-4756-9A6A-F1865DCD4D10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del agente \"home\" (HA) en  (1) la funcionalida de Mobile IP NAT Traversal y (2) el subsistema Mobile IPv6 en Cisco IOS v12.3 hasta v12.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (presi\u00f3n en la cola de entrada y parada del interfaz) mediante un paquete ICMP, conocido como Bug ID CSCso05337."
    }
  ],
  "id": "CVE-2009-0634",
  "lastModified": "2024-11-21T01:00:34.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-27T16:30:02.063",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49424"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.