ID
VAR-E-201209-0106
CVE
cve_id: | CVE-2012-4623 | Trust: 0.3 |
TITLE
Cisco IOS DHCP Version 6 Server CVE-2012-4623 Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users.
This issue is tracked by Cisco Bug ID CSCto57723.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.4 | Trust: 0.6 |
vendor: | cisco | model: | ios 15.0 m1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.6.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.6.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.4.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe t | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.3.xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.3.2s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.2.xsg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.2.xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.2.0sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.1xsg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe 3.1.xs | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.5 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | cisco | model: | ios xe | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 gc2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1snh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1sng | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1s | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1ey | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0sy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0sg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0mra | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0 m2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ye | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xn | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2se | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2scf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sce | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2scb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sca | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sbc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2sb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ird | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2irb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ira | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 scf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2 scf | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2012-4623 | Trust: 0.3 |
db: | BID | id: | 55700 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html | Trust: 0.3 |
url: | http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120926-dhcpv6 | Trust: 0.3 |
SOURCES
db: | BID | id: | 55700 |
LAST UPDATE DATE
2022-07-27T10:03:21.859000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 55700 | date: | 2015-03-19T08:40:00 |
SOURCES RELEASE DATE
db: | BID | id: | 55700 | date: | 2012-09-26T00:00:00 |