ID

VAR-201209-0396


CVE

CVE-2012-3923


TITLE

Cisco IOS of SSLVPN Service disruption in implementations ( Device crash ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-004411

DESCRIPTION

The SSLVPN implementation in Cisco IOS 12.4, 15.0, 15.1, and 15.2, when DTLS is not enabled, does not properly handle certain outbound ACL configurations, which allows remote authenticated users to cause a denial of service (device crash) via a session involving a PPP over ATM (PPPoA) interface, aka Bug ID CSCte41827. Cisco IOS is a popular Internet operating system. The vulnerability Cisco bug ID is CSCte41827. Cisco IOS is prone to multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to cause the affected device to crash and reload, denying service to legitimate users

Trust: 2.52

sources: NVD: CVE-2012-3923 // JVNDB: JVNDB-2012-004411 // CNVD: CNVD-2012-5236 // BID: 55604 // VULHUB: VHN-57204

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-5236

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 3.3

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 3.3

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 3.0

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 3.0

vendor:ciscomodel:ios 15.1 sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.1 t3scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.1 t4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.0sescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 s2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios sgscope:eqversion:15.1

Trust: 0.3

vendor:ciscomodel:ios 15.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m5ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios mscope:eqversion:15.0

Trust: 0.3

vendor:ciscomodel:ios 15.0 s5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 ey2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 s3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 s4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3ascope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2012-5236 // BID: 55604 // JVNDB: JVNDB-2012-004411 // CNNVD: CNNVD-201209-362 // NVD: CVE-2012-3923

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3923
value: LOW

Trust: 1.0

NVD: CVE-2012-3923
value: LOW

Trust: 0.8

CNNVD: CNNVD-201209-362
value: LOW

Trust: 0.6

VULHUB: VHN-57204
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-3923
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57204
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57204 // JVNDB: JVNDB-2012-004411 // CNNVD: CNNVD-201209-362 // NVD: CVE-2012-3923

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2012-3923

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-362

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201209-362

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004411

PATCH

title:Release 15.2(1)T Caveatsurl:http://www.cisco.com/en/US/docs/ios/15_2m_and_t/release/notes/152-1TCAVS.html

Trust: 0.8

title:Patch for Cisco IOS SSL VPN Implementation Denial of Service Vulnerability (CNVD-2012-5236)url:https://www.cnvd.org.cn/patchInfo/show/22508

Trust: 0.6

sources: CNVD: CNVD-2012-5236 // JVNDB: JVNDB-2012-004411

EXTERNAL IDS

db:NVDid:CVE-2012-3923

Trust: 3.4

db:JVNDBid:JVNDB-2012-004411

Trust: 0.8

db:CNNVDid:CNNVD-201209-362

Trust: 0.7

db:CNVDid:CNVD-2012-5236

Trust: 0.6

db:NSFOCUSid:20814

Trust: 0.6

db:BIDid:55604

Trust: 0.3

db:VULHUBid:VHN-57204

Trust: 0.1

sources: CNVD: CNVD-2012-5236 // VULHUB: VHN-57204 // BID: 55604 // JVNDB: JVNDB-2012-004411 // CNNVD: CNNVD-201209-362 // NVD: CVE-2012-3923

REFERENCES

url:http://www.cisco.com/en/us/docs/ios/15_2m_and_t/release/notes/152-1tcavs.html

Trust: 2.3

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78670

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3923

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3923

Trust: 0.8

url:http://www.nsfocus.net/vulndb/20814

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2012-5236 // VULHUB: VHN-57204 // BID: 55604 // JVNDB: JVNDB-2012-004411 // CNNVD: CNNVD-201209-362 // NVD: CVE-2012-3923

CREDITS

Cisco

Trust: 0.3

sources: BID: 55604

SOURCES

db:CNVDid:CNVD-2012-5236
db:VULHUBid:VHN-57204
db:BIDid:55604
db:JVNDBid:JVNDB-2012-004411
db:CNNVDid:CNNVD-201209-362
db:NVDid:CVE-2012-3923

LAST UPDATE DATE

2025-04-11T22:56:08.370000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5236date:2012-09-19T00:00:00
db:VULHUBid:VHN-57204date:2017-08-29T00:00:00
db:BIDid:55604date:2015-03-19T09:08:00
db:JVNDBid:JVNDB-2012-004411date:2012-09-18T00:00:00
db:CNNVDid:CNNVD-201209-362date:2012-09-19T00:00:00
db:NVDid:CVE-2012-3923date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-5236date:2012-09-19T00:00:00
db:VULHUBid:VHN-57204date:2012-09-16T00:00:00
db:BIDid:55604date:2012-09-19T00:00:00
db:JVNDBid:JVNDB-2012-004411date:2012-09-18T00:00:00
db:CNNVDid:CNNVD-201209-362date:2012-09-19T00:00:00
db:NVDid:CVE-2012-3923date:2012-09-16T10:34:51.393