ID

VAR-201209-0397


CVE

CVE-2012-3924


TITLE

Cisco IOS of SSLVPN Service disruption in implementations ( Device crash ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-004412

DESCRIPTION

The SSLVPN implementation in Cisco IOS 15.1 and 15.2, when DTLS is enabled, does not properly handle certain outbound ACL configurations, which allows remote authenticated users to cause a denial of service (device crash) via a session involving a PPP over ATM (PPPoA) interface, aka Bug ID CSCty97961. Cisco IOS is a popular Internet operating system. This vulnerability Cisco bug ID is CSCty97961. Cisco IOS is prone to multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to cause the affected device to crash and reload, denying service to legitimate users

Trust: 2.52

sources: NVD: CVE-2012-3924 // JVNDB: JVNDB-2012-004412 // CNVD: CNVD-2012-5238 // BID: 55604 // VULHUB: VHN-57205

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-5238

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 3.3

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 3.0

vendor:ciscomodel:ios 15.1 sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.1 t3scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.1 t4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 t2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.0sescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 tscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 15.1 s2scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios sgscope:eqversion:15.1

Trust: 0.3

vendor:ciscomodel:ios 15.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 xb5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m5ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios mscope:eqversion:15.0

Trust: 0.3

vendor:ciscomodel:ios 15.0 s5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t2ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 ey2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1.3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 se1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 0.3

vendor:ciscomodel:ios 15.1 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 t5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 s3ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 s4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 s1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3ascope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2012-5238 // BID: 55604 // JVNDB: JVNDB-2012-004412 // CNNVD: CNNVD-201209-363 // NVD: CVE-2012-3924

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3924
value: LOW

Trust: 1.0

NVD: CVE-2012-3924
value: LOW

Trust: 0.8

CNNVD: CNNVD-201209-363
value: LOW

Trust: 0.6

VULHUB: VHN-57205
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-3924
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57205
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57205 // JVNDB: JVNDB-2012-004412 // CNNVD: CNNVD-201209-363 // NVD: CVE-2012-3924

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2012-004412 // NVD: CVE-2012-3924

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-363

TYPE

Design Error

Trust: 0.9

sources: BID: 55604 // CNNVD: CNNVD-201209-363

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004412

PATCH

title:Release 15.2(1)T Caveatsurl:http://www.cisco.com/en/US/docs/ios/15_2m_and_t/release/notes/152-1TCAVS.html

Trust: 0.8

title:Release 15.1(4)M Caveatsurl:http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-4MCAVS.html

Trust: 0.8

title:Patch for Cisco IOS SSL VPN Implementation Denial of Service Vulnerability (CNVD-2012-5238)url:https://www.cnvd.org.cn/patchInfo/show/22511

Trust: 0.6

sources: CNVD: CNVD-2012-5238 // JVNDB: JVNDB-2012-004412

EXTERNAL IDS

db:NVDid:CVE-2012-3924

Trust: 3.4

db:JVNDBid:JVNDB-2012-004412

Trust: 0.8

db:CNNVDid:CNNVD-201209-363

Trust: 0.7

db:CNVDid:CNVD-2012-5238

Trust: 0.6

db:NSFOCUSid:20814

Trust: 0.6

db:BIDid:55604

Trust: 0.3

db:VULHUBid:VHN-57205

Trust: 0.1

sources: CNVD: CNVD-2012-5238 // VULHUB: VHN-57205 // BID: 55604 // JVNDB: JVNDB-2012-004412 // CNNVD: CNNVD-201209-363 // NVD: CVE-2012-3924

REFERENCES

url:http://www.cisco.com/en/us/docs/ios/15_2m_and_t/release/notes/152-1tcavs.html

Trust: 2.3

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78672

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3924

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3924

Trust: 0.8

url:http://www.nsfocus.net/vulndb/20814

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2012-5238 // VULHUB: VHN-57205 // BID: 55604 // JVNDB: JVNDB-2012-004412 // CNNVD: CNNVD-201209-363 // NVD: CVE-2012-3924

CREDITS

Cisco

Trust: 0.3

sources: BID: 55604

SOURCES

db:CNVDid:CNVD-2012-5238
db:VULHUBid:VHN-57205
db:BIDid:55604
db:JVNDBid:JVNDB-2012-004412
db:CNNVDid:CNNVD-201209-363
db:NVDid:CVE-2012-3924

LAST UPDATE DATE

2025-04-11T22:56:08.403000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5238date:2012-09-19T00:00:00
db:VULHUBid:VHN-57205date:2017-08-29T00:00:00
db:BIDid:55604date:2015-03-19T09:08:00
db:JVNDBid:JVNDB-2012-004412date:2012-09-18T00:00:00
db:CNNVDid:CNNVD-201209-363date:2012-09-19T00:00:00
db:NVDid:CVE-2012-3924date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-5238date:2012-09-19T00:00:00
db:VULHUBid:VHN-57205date:2012-09-16T00:00:00
db:BIDid:55604date:2012-09-19T00:00:00
db:JVNDBid:JVNDB-2012-004412date:2012-09-18T00:00:00
db:CNNVDid:CNNVD-201209-363date:2012-09-19T00:00:00
db:NVDid:CVE-2012-3924date:2012-09-16T10:34:51.440