ID

VAR-201709-0002


CVE

CVE-2010-3050


TITLE

Cisco IOS Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-005710

DESCRIPTION

Cisco IOS before 12.2(33)SXI allows remote authenticated users to cause a denial of service (device reboot). Cisco IOS Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS is an operating system developed by Cisco Systems for its network devices. There is a security hole in Cisco IOS

Trust: 2.25

sources: NVD: CVE-2010-3050 // JVNDB: JVNDB-2010-005710 // CNVD: CNVD-2017-34248 // VULHUB: VHN-45655

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-34248

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:12.2\(33\)sxh2

Trust: 1.0

vendor:ciscomodel:iosscope:ltversion:12.2(33)sxi

Trust: 0.8

vendor:ciscomodel:ios <12.2 sxiscope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)sxh2

Trust: 0.6

sources: CNVD: CNVD-2017-34248 // JVNDB: JVNDB-2010-005710 // CNNVD: CNNVD-201709-1177 // NVD: CVE-2010-3050

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-3050
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-3050
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-34248
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201709-1177
value: MEDIUM

Trust: 0.6

VULHUB: VHN-45655
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-3050
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-34248
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-45655
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2010-3050
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-34248 // VULHUB: VHN-45655 // JVNDB: JVNDB-2010-005710 // CNNVD: CNNVD-201709-1177 // NVD: CVE-2010-3050

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-45655 // JVNDB: JVNDB-2010-005710 // NVD: CVE-2010-3050

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1177

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201709-1177

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005710

PATCH

title:Release Notes for Cisco IOS Release 12.2SXurl:https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/release/notes/ol_14271/caveats_SXI_rebuilds.html

Trust: 0.8

title:Patch for Cisco IOS Denial of Service Vulnerability (CNVD-2017-34248)url:https://www.cnvd.org.cn/patchInfo/show/104470

Trust: 0.6

title:Cisco IOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75120

Trust: 0.6

sources: CNVD: CNVD-2017-34248 // JVNDB: JVNDB-2010-005710 // CNNVD: CNNVD-201709-1177

EXTERNAL IDS

db:NVDid:CVE-2010-3050

Trust: 3.1

db:JVNDBid:JVNDB-2010-005710

Trust: 0.8

db:CNNVDid:CNNVD-201709-1177

Trust: 0.7

db:CNVDid:CNVD-2017-34248

Trust: 0.6

db:NSFOCUSid:37697

Trust: 0.6

db:VULHUBid:VHN-45655

Trust: 0.1

sources: CNVD: CNVD-2017-34248 // VULHUB: VHN-45655 // JVNDB: JVNDB-2010-005710 // CNNVD: CNNVD-201709-1177 // NVD: CVE-2010-3050

REFERENCES

url:https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2sx/release/notes/ol_14271/caveats_sxi_rebuilds.html

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3050

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2010-3050

Trust: 0.8

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3050

Trust: 0.6

url:http://www.nsfocus.net/vulndb/37697

Trust: 0.6

sources: CNVD: CNVD-2017-34248 // VULHUB: VHN-45655 // JVNDB: JVNDB-2010-005710 // CNNVD: CNNVD-201709-1177 // NVD: CVE-2010-3050

SOURCES

db:CNVDid:CNVD-2017-34248
db:VULHUBid:VHN-45655
db:JVNDBid:JVNDB-2010-005710
db:CNNVDid:CNNVD-201709-1177
db:NVDid:CVE-2010-3050

LAST UPDATE DATE

2025-04-20T23:40:02.070000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-34248date:2017-11-17T00:00:00
db:VULHUBid:VHN-45655date:2017-10-03T00:00:00
db:JVNDBid:JVNDB-2010-005710date:2017-10-17T00:00:00
db:CNNVDid:CNNVD-201709-1177date:2017-09-29T00:00:00
db:NVDid:CVE-2010-3050date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-34248date:2017-11-17T00:00:00
db:VULHUBid:VHN-45655date:2017-09-25T00:00:00
db:JVNDBid:JVNDB-2010-005710date:2017-10-17T00:00:00
db:CNNVDid:CNNVD-201709-1177date:2017-09-29T00:00:00
db:NVDid:CVE-2010-3050date:2017-09-25T17:29:00.240