ID

VAR-201108-0015


CVE

CVE-2011-1624


TITLE

Cisco IOS Service disruption in ( Device reload ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-003152

DESCRIPTION

Cisco IOS 12.2(58)SE, when a login banner is configured, allows remote attackers to cause a denial of service (device reload) by establishing two SSH2 sessions, aka Bug ID CSCto62631. Cisco IOS is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to crash the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCto62631. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 1.98

sources: NVD: CVE-2011-1624 // JVNDB: JVNDB-2011-003152 // BID: 49282 // VULHUB: VHN-49569

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2\(58\)se

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2(58)se

Trust: 0.8

vendor:ciscomodel:ios 12.2 sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 se1scope:neversion: -

Trust: 0.3

sources: BID: 49282 // JVNDB: JVNDB-2011-003152 // CNNVD: CNNVD-201108-345 // NVD: CVE-2011-1624

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1624
value: HIGH

Trust: 1.0

NVD: CVE-2011-1624
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201108-345
value: HIGH

Trust: 0.6

VULHUB: VHN-49569
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-1624
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-49569
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-49569 // JVNDB: JVNDB-2011-003152 // CNNVD: CNNVD-201108-345 // NVD: CVE-2011-1624

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-49569 // JVNDB: JVNDB-2011-003152 // NVD: CVE-2011-1624

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201108-345

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201108-345

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003152

PATCH

title:Release Notes for the Cisco IE 3000 Switch, Cisco IOS Release 12.2(58)SE1 and Laterurl:http://www.cisco.com/en/US/docs/switches/lan/cisco_ie3000/software/release/12.2_58_se/release/notes/OL24335.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-003152

EXTERNAL IDS

db:NVDid:CVE-2011-1624

Trust: 2.8

db:JVNDBid:JVNDB-2011-003152

Trust: 0.8

db:CNNVDid:CNNVD-201108-345

Trust: 0.7

db:NSFOCUSid:17603

Trust: 0.6

db:BIDid:49282

Trust: 0.4

db:VULHUBid:VHN-49569

Trust: 0.1

sources: VULHUB: VHN-49569 // BID: 49282 // JVNDB: JVNDB-2011-003152 // CNNVD: CNNVD-201108-345 // NVD: CVE-2011-1624

REFERENCES

url:http://www.cisco.com/en/us/docs/switches/lan/cisco_ie3000/software/release/12.2_58_se/release/notes/ol24335.html

Trust: 2.0

url:https://supportforums.cisco.com/message/3356210

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1624

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1624

Trust: 0.8

url:http://www.nsfocus.net/vulndb/17603

Trust: 0.6

url:http://www.cisco.com/en/us/docs/switchehttp://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscto62631

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

sources: VULHUB: VHN-49569 // BID: 49282 // JVNDB: JVNDB-2011-003152 // CNNVD: CNNVD-201108-345 // NVD: CVE-2011-1624

CREDITS

Reported by the vendor.

Trust: 0.3

sources: BID: 49282

SOURCES

db:VULHUBid:VHN-49569
db:BIDid:49282
db:JVNDBid:JVNDB-2011-003152
db:CNNVDid:CNNVD-201108-345
db:NVDid:CVE-2011-1624

LAST UPDATE DATE

2025-04-11T22:49:58.805000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-49569date:2012-03-15T00:00:00
db:BIDid:49282date:2011-08-23T00:00:00
db:JVNDBid:JVNDB-2011-003152date:2011-12-01T00:00:00
db:CNNVDid:CNNVD-201108-345date:2011-08-22T00:00:00
db:NVDid:CVE-2011-1624date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-49569date:2011-08-18T00:00:00
db:BIDid:49282date:2011-08-23T00:00:00
db:JVNDBid:JVNDB-2011-003152date:2011-12-01T00:00:00
db:CNNVDid:CNNVD-201108-345date:2011-08-19T00:00:00
db:NVDid:CVE-2011-1624date:2011-08-18T18:55:01.397