ID

VAR-201709-0001


CVE

CVE-2010-3049


TITLE

Cisco IOS Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-005709

DESCRIPTION

Cisco IOS Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS is an operating system developed by Cisco Systems for its network devices. There is a security hole in Cisco IOS. A local attacker could exploit the vulnerability to cause a denial of service (device reboot)

Trust: 1.35

sources: JVNDB: JVNDB-2010-005709 // CNVD: CNVD-2017-34249 // VULHUB: VHN-45654

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-34249

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:12.2\(33\)sxh2

Trust: 1.0

vendor:ciscomodel:iosscope:ltversion:12.2(33)sxi

Trust: 0.8

vendor:ciscomodel:ios <12.2 sxiscope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh2

Trust: 0.6

sources: CNVD: CNVD-2017-34249 // JVNDB: JVNDB-2010-005709 // CNNVD: CNNVD-201709-1178 // NVD: CVE-2010-3049

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-3049
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-3049
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-34249
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201709-1178
value: MEDIUM

Trust: 0.6

VULHUB: VHN-45654
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-3049
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-34249
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-45654
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2010-3049
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-34249 // VULHUB: VHN-45654 // JVNDB: JVNDB-2010-005709 // CNNVD: CNNVD-201709-1178 // NVD: CVE-2010-3049

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-45654 // JVNDB: JVNDB-2010-005709 // NVD: CVE-2010-3049

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201709-1178

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201709-1178

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005709

PATCH

title:Release Notes for Cisco IOS Release 12.2SXurl:https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/release/notes/ol_14271/caveats_SXI_rebuilds.html

Trust: 0.8

title:Patch for Cisco IOS Denial of Service Vulnerability (CNVD-2017-34249)url:https://www.cnvd.org.cn/patchInfo/show/104473

Trust: 0.6

title:Cisco IOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75121

Trust: 0.6

sources: CNVD: CNVD-2017-34249 // JVNDB: JVNDB-2010-005709 // CNNVD: CNNVD-201709-1178

EXTERNAL IDS

db:NVDid:CVE-2010-3049

Trust: 3.1

db:JVNDBid:JVNDB-2010-005709

Trust: 0.8

db:CNNVDid:CNNVD-201709-1178

Trust: 0.7

db:CNVDid:CNVD-2017-34249

Trust: 0.6

db:NSFOCUSid:37699

Trust: 0.6

db:VULHUBid:VHN-45654

Trust: 0.1

sources: CNVD: CNVD-2017-34249 // VULHUB: VHN-45654 // JVNDB: JVNDB-2010-005709 // CNNVD: CNNVD-201709-1178 // NVD: CVE-2010-3049

REFERENCES

url:https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2sx/release/notes/ol_14271/caveats_sxi_rebuilds.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3049

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2010-3049

Trust: 0.8

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3049

Trust: 0.6

url:http://www.nsfocus.net/vulndb/37699

Trust: 0.6

sources: CNVD: CNVD-2017-34249 // VULHUB: VHN-45654 // JVNDB: JVNDB-2010-005709 // CNNVD: CNNVD-201709-1178 // NVD: CVE-2010-3049

SOURCES

db:CNVDid:CNVD-2017-34249
db:VULHUBid:VHN-45654
db:JVNDBid:JVNDB-2010-005709
db:CNNVDid:CNNVD-201709-1178
db:NVDid:CVE-2010-3049

LAST UPDATE DATE

2025-04-20T23:38:27.906000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-34249date:2017-11-17T00:00:00
db:VULHUBid:VHN-45654date:2017-10-03T00:00:00
db:JVNDBid:JVNDB-2010-005709date:2017-10-17T00:00:00
db:CNNVDid:CNNVD-201709-1178date:2017-09-29T00:00:00
db:NVDid:CVE-2010-3049date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-34249date:2017-11-17T00:00:00
db:VULHUBid:VHN-45654date:2017-09-25T00:00:00
db:JVNDBid:JVNDB-2010-005709date:2017-10-17T00:00:00
db:CNNVDid:CNNVD-201709-1178date:2017-09-29T00:00:00
db:NVDid:CVE-2010-3049date:2017-09-25T17:29:00.193