VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201309-0298 CVE-2013-5473 Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Memory leak in Cisco IOS 12.2, 15.1, and 15.2; IOS XE 3.4.2S through 3.4.5S; and IOS XE 3.6.xS before 3.6.1S allows remote attackers to cause a denial of service (memory consumption or device reload) via malformed IKEv1 packets, aka Bug ID CSCtx66011. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The vulnerability is that the affected software incorrectly processes the specially crafted IKE packet. The attacker can send a special IKEv1 packet to the device configured with IKEv1 through UDP port 500, 848 or 4500 to trigger the vulnerability. The successful exploitation of the vulnerability can prevent the Cisco IOS software from being released. Memory has been allocated, causing a memory leak. A sustained attack can be overloaded with the device, causing a denial of service attack. The following devices are affected by this vulnerability: Cisco Cisco IOS XE Software 3.4S .2, .3, .4 | 3.6S .0, BaseCiscoIOS 15.1M 15.1(4)M3, 15.1(4)M3a, 15.1(4)M4 | 15.1MR 15.1(3)MR | 15.1S 15.1(3)S2, 15.1(3)S3, 15.1(3)S4, 15.1(3)S5, 15.1(3)S5a | 15.1XB 15.1(4)XB7, 15.1(4) XB8a | 15.2GC 15.2(3)GC | 15.2GCA 15.2(3)GCA | 15.2S 15.2(2)S | 15.2T 15.2(3)T, 15.2(3)T1, 15.2(3)T2 | 15.2XA 15.2( 3) XA. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCtx66011
VAR-201309-0299 CVE-2013-5474 Cisco IOS of IPv6 Virtual Fragmentation Reassembly Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Race condition in the IPv6 virtual fragmentation reassembly (VFR) implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.3 allows remote attackers to cause a denial of service (device reload or hang) via fragmented IPv6 packets, aka Bug ID CSCud64812. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The vulnerability is due to a race condition error when accessing the IPv6 fragment reassembly queue. The attacker can send a specially crafted legal IPv6 fragment stream to trigger the vulnerability. When these fragments are processed, the affected device may be suspended or reloaded and sent continuously. This message can cause a denial of service attack. The following devices are affected by this vulnerability: CiscoIOS 12.3(11)T Base | 12.3(11)T10 Base | 12.3(11)T11 Base | 12.3(11)XL Base | 12.3(11)YK Base | 12.3(11)YN Base 12.3(11)YS Base | 12.3(11)YZ Base | 12.3(11)YZ1 Base | 12.3(11)ZB Base | 12.3(14)T Base | 12.3(14)T7 Base | 12.3(14)YM8 Base | 12.3(14)YT Base | 12.3(4)XG Base | 12.3(4)XH Base | 12.3(4)XQ Base | 12.3(7)T Base | 12.3(7)T12 Base | 12.3(7)XL Base | 12.3 (7) XR Base | 12.3(7)XS Base | 12.3(8)T Base | 12.3(8)XX Base | 12.3(8)YA Base | 12.3(8)YC Base | 12.3(8)YD Base | 12.3( 8) YG Base | 12.3(8)YH Base | 12.3(8)YI Base | 12.3(8)ZA Base | 12.3T 12.3(11)T1, 12.3(11)T12, 12.3(11)T2, 12.3(11) T2a, 12.3(11)T3, 12.3(11)T4, 12.3(11)T5, 12.3(11)T6, 12.3(11)T7, 12.3(11)T8, 12.3(11)T9, 12.3(14)T1, 12.3(14)T2, 12.3(14)T3, 12.3(14)T4, 12.3(14)T5, 12.3(14)T6, 12.3(7)T1, 12.3(7)T10, 12.3(7)T11, 12.3( 7) T2, 12.3(7)T3, 12.3(7)T4, 12.3(7)T6, 12.3(7)T7, 12.3(7)T8, 12.3(7)T9, 12.3(8)T1, 12.3(8) T10, 12.3(8)T11, 12.3(8)T2, 12.3(8)T3, 12.3(8)T4, 12.3(8)T5, 12.3(8)T6, 12. 3(8)T7, 12.3(8)T8, 12.3(8)T9 | 12.3XG 12.3(4)XG1, 12.3(4)XG2, 12.3(4)XG3, 12.3(4)XG4, 12.3(4)XG5 | 12.3XH 12.3(4)XH1 | 12.3XK 12.3(4)XK, 12.3(4)XK1, 12.3(4)XK2, 12.3(4)XK3, 12.3(4)XK4 | 12.3XL 12.3(11)XL1, 12.3( 11) XL2, 12.3(11)XL3 | 12.3XQ 12.3(4)XQ1 | 12.3XR 12.3(7)XR1, 12.3(7)XR2, 12.3(7)XR3, 12.3(7)XR4, 12.3(7)XR5, 12.3(7)XR6, 12.3(7)XR7 | 12.3XS 12.3(7)XS1, 12.3(7)XS2 | 12.3XX 12.3(8)XX1, 12.3(8)XX2e | 12.3YA 12.3(8)YA1 | 12.3YC 12.3(8)YC1, 12.3(8)YC2, 12.3(8)YC3 | 12.3YD 12.3(8)YD1 | 12.3YG 12.3(8)YG1, 12.3(8)YG2, 12.3(8)YG3, 12.3(8) YG4, 12.3(8)YG5, 12.3(8)YG6, 12.3(8)YG7 | 12.3YI 12.3(8)YI1, 12.3(8)YI2, 12.3(8)YI3 | 12.3YK 12.3(11)YK1, 12.3( 11) YK2, 12.3(11)YK3 | 12.3YM 12.3(14)YM1, 12.3(14)YM10, 12.3(14)YM11, 12.3(14)YM12, 12.3(14)YM13, 12.3(14)YM2, 12.3( 14) YM3, 12.3(14)YM4, 12.3(14)YM5, 12.3(14)YM6, 12.3(14)YM7, 12.3(14)YM9 | 12.3YS 12.3(11)YS1, 12.3(11)YS2 | 12.3YT 12.3(14)YT1 | 12.3YZ 12.3(11)YZ2 | 12.3ZA 12.3(8)ZA1 | 12.3ZB 12.3(11)ZB1, 12.3(11)ZB2 | 12.4 12.4(10c), 12.4(12c) , 12.4(13d), 12.4(13e), 12.4(13f), 12.4(16), 12.4(16a), 12.4(16b), 12.4(17a), 12.4(17b), 12.4(18), 12.4(18a) , 12.4(18b), 12.4(18c), 12.4(18d), 12.4(18e), 12.4(19), 12.4(21), 12.4(21a), 12.4(23), 12.4(23a), 12.4(23b) , 12.4(23c), 12.4(23d), 12.4(23e), 12.4(25), 12.4(25a), 12.4(25b), 12.4(25c), 12.4(25d), 12.4(25e), 12.4(25f) , 12.4(25g), 12.4(3h), 12.4(3i), 12.4(3j), 12.4(5c), 12.4(7f), 12.4(7g), 12.4(7h), 12.4(8d) | 12.4(1) Base | 12.4(10) Base | 12.4(10a) Base | 12.4(10b) Base | 12.4(11)T Base | 12.4(11)XJ Base | 12.4(11)XV Base | 12.4(11)XW Base | 12.4( 12) Base | 12.4(12a) Base | 12.4(12b) Base | 12.4(13) Base | 12.4(13a) Base | 12.4(13b) Base | 12.4(13c) Base | 12.4(14)XK Base | 12.4(15 ) T Base | 12.4(15)XF Base | 12.4(17) Base | 12.4(1a) Base | 12.4(1b) Base | 12.4(1c) Base | 12.4(2)T Base | 12.4(2)T5 Base | 12.4 (2) XA Base | 12.4(20)T Base | 12.4(24)T Base | 12.4(24)T3 Base | 12.4(3) Base | 12.4(3a) Base | 12.4(3b) Base | 12.4(3c) Base 12.4(3d) Base | 12.4(3e) Base | 12.4(3f) Base | 12.4(3g) Base | 12.4(4)T Base | 12.4(4)T1 Base | 12.4(4)T2 Base | 12.4(4)T3 Base | 12.4(4)T4 Base | 12.4(4)XC Base | 12.4( 4) XD Base | 12.4(5) Base | 12.4(5a) Base | 12.4(5b) Base | 12.4(6)T Base | 12.4(6)T1 Base | 12.4(6)T2 Base | 12.4(6)T3 Base 12.4(6)XE Base | 12.4(6)XT Base | 12.4(7) Base | 12.4(7a) Base | 12.4(7b) Base | 12.4(7c) Base | 12.4(7d) Base | 12.4(7e) Base 12.4(8) Base | 12.4(8a) Base | 12.4(8b) Base | 12.4(8c) Base | 12.4(9)T Base | 12.4GC 12.4(22)GC1, 12.4(22)GC1a, 12.4(24) GC1, 12.4(24)GC3, 12.4(24)GC3a, 12.4(24)GC4, 12.4(24)GC5 | 12.4M 12.4(21a)M1, 12.4(23b)M1, 12.4(5a)M0 | 12.4MDA 12.4( 24) MDA, 12.4(24)MDA1, 12.4(24)MDA10, 12.4(24)MDA11, 12.4(24)MDA12, 12.4(24)MDA13, 12.4(24)MDA2, 12.4(24)MDA3, 12.4(24) MDA4, 12.4(24)MDA5, 12.4(24)MDA6, 12.4(24)MDA7, 12.4(24)MDA8, 12.4(24)MDA9 | 12.4MDB 12.4(24)MDB, 12.4(24)MDB1, 12.4(24) MDB10, 12.4(24)MDB11, 12.4(24)MDB12, 12.4(24)MDB13, 12.4(24)MDB14, 12.4(24)MDB3, 12.4(24)MDB4, 12.4(24)MDB5, 12.4(24)MDB5a, 12.4(24)MDB6, 12.4(24) MDB7, 12.4(24)MDB8, 12.4(24)MDB9 | 12.4MR 12.4(16)MR1, 12.4(16)MR2, 12.4(19)MR, 12.4(19)MR1, 12.4(19)MR2, 12.4(19) MR3, 12.4(20)MR, 12.4(20)MR2 | 12.4MRA 12.4(20)MRA, 12.4(20)MRA1 | 12.4MRB 12.4(20)MRB, 12.4(20)MRB1 | 12.4T 12.4(11)T1, 12.4(11)T2, 12.4(11)T3, 12.4(11)T4, 12.4(15)T1, 12.4(15)T10, 12.4(15)T11, 12.4(15)T12, 12.4(15)T13, 12.4( 15) T13b, 12.4(15)T14, 12.4(15)T15, 12.4(15)T16, 12.4(15)T17, 12.4(15)T2, 12.4(15)T3, 12.4(15)T4, 12.4(15) T5, 12.4(15)T6, 12.4(15)T6a, 12.4(15)T7, 12.4(15)T8, 12.4(15)T9, 12.4(2)T1, 12.4(2)T2, 12.4(2)T3, 12.4(2)T4, 12.4(2)T6, 12.4(20)T1, 12.4(20)T2, 12.4(20)T3, 12.4(20)T4, 12.4(20)T5, 12.4(20)T5a, 12.4( 20) T6, 12.4(22)T, 12.4(22)T1, 12.4(22)T2, 12.4(22)T3, 12.4(22)T4, 12.4(22)T5, 12.4(24)T1, 12.4(24) T2, 12.4(24)T31f, 12.4(24)T32f, 12.4(24)T33f, 12.4(24)T34f, 12.4(24)T35c, 12.4(24)T35f, 12.4(24)T3c, 12.4(24)T3e, 12.4(24)T3f, 12.4(24)T3g, 12.4(24)T4, 12.4(24)T4a, 12.4(24)T4b, 12.4(24)T4c, 12.4(24)T4d, 12.4(24)T4e, 12.4( 24) T4f, 12.4(24)T4g, 12.4(24)T4h, 12. 4(24)T4i, 12.4(24)T4j, 12.4(24)T4k, 12.4(24)T4l, 12.4(24)T4m, 12.4(24)T4n, 12.4(24)T5, 12.4(24)T6, 12.4( 24) T7, 12.4(24)T8, 12.4(24)T9, 12.4(4)T5, 12.4(4)T6, 12.4(4)T7, 12.4(4)T8, 12.4(6)T10, 12.4(6) T11, 12.4(6)T12, 12.4(6)T4, 12.4(6)T5, 12.4(6)T5a, 12.4(6)T5b, 12.4(6)T5c, 12.4(6)T5e, 12.4(6)T5f, 12.4(6)T6, 12.4(6)T7, 12.4(6)T8, 12.4(6)T9, 12.4(9)T0a, 12.4(9)T1, 12.4(9)T2, 12.4(9)T3, 12.4( 9) T4, 12.4(9)T5, 12.4(9)T6, 12.4(9)T7 | 12.4XA 12.4(2)XA1, 12.4(2)XA2 | 12.4XC 12.4(4)XC1, 12.4(4)XC2, 12.4(4)XC3, 12.4(4)XC4, 12.4(4)XC5, 12.4(4)XC6, 12.4(4)XC7 | 12.4XD 12.4(4)XD1, 12.4(4)XD10, 12.4(4)XD11, 12.4(4)XD12, 12.4(4)XD2, 12.4(4)XD3, 12.4(4)XD4, 12.4(4)XD5, 12.4(4)XD6, 12.4(4)XD7, 12.4(4)XD8, 12.4( 4) XD9 | 12.4XE 12.4(6)XE1, 12.4(6)XE2, 12.4(6)XE3 | 12.4XJ 12.4(11)XJ1, 12.4(11)XJ2, 12.4(11)XJ3, 12.4(11)XJ4, 12.4(11)XJ5, 12.4(11)XJ6 | 12.4XQ 12.4(15)XQ, 12.4(15)XQ1, 12.4(15)XQ2, 12.4(15)XQ2a, 12.4(15)XQ2b, 12.4(15)XQ2c, 12.4(15)XQ2d, 12.4(15)XQ3, 12.4(15)XQ4, 12.4(15)XQ5, 12.4(15)XQ6, 12.4(15 ) XQ7, 12.4(15)XQ8 | 12.4XR 12.4(15)XR, 12.4(15)XR1, 12.4(15)XR10, 12.4(15)XR2, 12.4(15)XR3, 12.4(15)XR4, 12.4(15 ) XR5, 12.4(15)XR6, 12.4(15)XR7, 12.4(15)XR8, 12.4(15)XR9, 12.4(22)XR, 12.4(22)XR1, 12.4(22)XR10, 12.4(22)XR11 , 12.4(22)XR12, 12.4(22)XR2, 12.4(22)XR3, 12.4(22)XR4, 12.4(22)XR5, 12.4(22)XR6, 12.4(22)XR7, 12.4(22)XR8, 12.4 (22) XR9 | 12.4XT 12.4(6)XT1, 12.4(6)XT2 | 12.4XV 12.4(11)XV1 | 12.4XW 12.4(11)XW1, 12.4(11)XW10, 12.4(11)XW2, 12.4(11 ) XW3, 12.4(11)XW4, 12.4(11)XW5, 12.4(11)XW6, 12.4(11)XW7, 12.4(11)XW8, 12.4(11)XW9 | 12.4XY 12.4(15)XY, 12.4(15 )XY1, 12.4(15)XY2, 12.4(15)XY3, 12.4(15)XY4, 12.4(15)XY5 | 12.4XZ 12.4(15)XZ, 12.4(15)XZ1, 12.4(15)XZ2 | 12.4YA 12.4 (20) YA, 12.4(20)YA1, 12.4(20)YA2, 12.4(20)YA3 | 12.4YB 12.4(22)YB, 12.4(22)YB1, 12.4(22)YB4, 12.4(22)YB5, 12.4 (22) YB6, 12.4(22)YB7, 12.4(22)YB8 | 12.4YD 12.4(22)YD, 12.4(22)YD1, 12.4(22)YD2, 12.4(22)YD3, 12.4(22)YD4 | 12.4 YE 12.4(22)YE, 12.4(22)YE1, 12.4(22)YE2, 12.4(22)YE3, 12.4(22)YE4, 12.4(22)YE5, 12.4(22)YE6, 12.4(24)Y E, 12.4(24)YE1, 12.4(24)YE2, 12.4(24)YE3, 12.4(24)YE3a, 12.4(24)YE3b, 12.4(24)YE3c, 12.4(24)YE3d, 12.4(24)YE3e, 12.4(24)YE4, 12.4(24)YE5, 12.4(24)YE6, 12.4(24)YE7 | 12.4YS 12.4(24)YS, 12.4(24)YS1 | 15.0(1)M1 Base | 15.0M 15.0(1 M, 15.0(1)M10, 15.0(1)M2, 15.0(1)M3, 15.0(1)M4, 15.0(1)M5, 15.0(1)M6, 15.0(1)M6a, 15.0(1)M7 , 15.0(1)M8, 15.0(1)M9 | 15.0XA 15.0(1)XA, 15.0(1)XA1, 15.0(1)XA2, 15.0(1)XA3, 15.0(1)XA4, 15.0(1)XA5 | 15.1(2)T Base | 15.1GC 15.1(2)GC, 15.1(2)GC1, 15.1(2)GC2, 15.1(4)GC, 15.1(4)GC1 | 15.1M 15.1(4)M, 15.1( 4) M0a, 15.1(4)M0b, 15.1(4)M1, 15.1(4)M2, 15.1(4)M3, 15.1(4)M3a, 15.1(4)M4, 15.1(4)M5, 15.1(4) M6 | 15.1T 15.1(1)T, 15.1(1)T1, 15.1(1)T2, 15.1(1)T3, 15.1(1)T4, 15.1(1)T5, 15.1(2)T0a, 15.1(2) T1, 15.1(2)T2, 15.1(2)T2a, 15.1(2)T3, 15.1(2)T4, 15.1(2)T5, 15.1(3)T, 15.1(3)T1, 15.1(3)T2, 15.1(3)T3, 15.1(3)T4 | 15.1XB 15.1(1)XB, 15.1(1)XB1, 15.1(1)XB2, 15.1(1)XB3, 15.1(4)XB4, 15.1(4)XB5, 15.1(4)XB5a, 15.1(4)XB6, 15.1(4)XB7, 15.1(4)XB8a | 15.2GC 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2)GC, 15.2(3)GC | 15.2GCA 15.2(3)GCA | 15.2M 15.2(4)M, 15.2(4)M1, 15.2(4)M2, 15.2(4)M3 | 15.2T 15.2( 1) T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2(1)T3a, 15.2(1)T4, 15.2(2)T, 15.2(2)T1, 15.2(2) T2, 15.2(2)T3, 15.2(3)T, 15.2(3)T1, 15.2(3)T2 | 15.2XA 15.2(3)XA | 15.2XB 15.2(4)XB10 | 15.3T 15.3(1)T. Cisco IOS is prone to a remote denial-of-service vulnerability. Successful exploits may allow an attackers to cause a reload of the affected devices, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCud64812
VAR-201309-0443 CVE-2013-5475 Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco IOS 12.2 through 12.4 and 15.0 through 15.3, and IOS XE 2.1 through 3.9, allows remote attackers to cause a denial of service (device reload) via crafted DHCP packets that are processed locally by a (1) server or (2) relay agent, aka Bug ID CSCug31561. Cisco IOS and IOS XE There is a service disruption ( Device reload ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS has a security hole in the DHCP implementation. An unauthenticated remote attacker exploiting this vulnerability could result in a denial of service. Attackers can exploit this issue to cause a reload of the affected devices, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCug31561. The vulnerability is caused by the program not correctly parsing DHCP packets
VAR-201309-0444 CVE-2013-5476 Cisco IOS Service disruption in modern zone-based policy firewalls (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The Zone-Based Firewall (ZFW) feature in Cisco IOS 15.1 through 15.2, when content filtering or HTTP ALG inspection is enabled, allows remote attackers to cause a denial of service (device reload or hang) via crafted IPv4 HTTP traffic, aka Bug ID CSCtx56174. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A security vulnerability exists in the Cisco IOS domain-based firewall component that allows unauthenticated remote attackers to suspend or reload affected devices. If the device is configured with content filtering or HTTP application layer gateway detection, the attacker sends a specific HTTP packet to the affected device to trigger the vulnerability. The vulnerability can be successfully used to suspend the device or Overloading, causing a denial of service attack. The following devices are affected by this vulnerability: Cisco IOS 15.1 GC 15.1(4)GC, 15.1(4)GC1 | 15.1M 15.1(4)M2, 15.1(4)M3, 15.1(4)M3a, 15.1(4)M4, 15.1( 4) M5 | 15.1XB 15.1(4)XB6, 15.1(4)XB7, 15.1(4)XB8a | 15.2GC 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2)GC, 15.2(3)GC, 15.2(3)GC1 | 15.2GCA 15.2(3)GCA | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2(1) T3a, 15.2(2)T, 15.2(2)T1, 15.2(2)T2, 15.2(2)T3, 15.2(2)T4, 15.2(3)T, 15.2(3)T1, 15.2(3)T2, 15.2(3)T3 | 15.2XA 15.2(3)XA. Cisco IOS is prone to a remote denial-of-service vulnerability. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCtx56174
VAR-201309-0445 CVE-2013-5477 Cisco IOS of T1/E1 driver-queue Service disruption in functionality (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The T1/E1 driver-queue functionality in Cisco IOS 12.2 and 15.0 through 15.3, when an HDLC32 driver is used, allows remote attackers to cause a denial of service (interface queue wedge) via bursty network traffic, aka Bug ID CSCub67465. Cisco IOS of T1/E1 driver-queue Features include HDLC32 If you are using a driver, the service operation is interrupted. ( Interface queue wedge ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. When the affected device handles burst communication, the packets queued by the Cisco IOS router or switch are not deleted from the queue, which can cause an interface queue attack. Repeated exploitation can lead to denial of service attacks. The following devices are affected by this vulnerability: Cisco IOS15.0(1)M1 Base | 15.0M 15.0(1)M, 15.0(1)M10, 15.0(1)M2, 15.0(1)M3, 15.0(1)M4, 15.0( 1) M5, 15.0(1)M6, 15.0(1)M6a, 15.0(1)M7, 15.0(1)M8, 15.0(1)M9 | 15.0XA 15.0(1)XA, 15.0(1)XA1, 15.0( 1) XA2, 15.0(1)XA3, 15.0(1)XA4, 15.0(1)XA5 | 15.1(2)T Base | 15.1GC 15.1(2)GC, 15.1(2)GC1, 15.1(2)GC2, 15.1 (4)GC, 15.1(4)GC1 | 15.1M 15.1(4)M, 15.1(4)M0a, 15.1(4)M0b, 15.1(4)M1, 15.1(4)M2, 15.1(4)M3, 15.1 (4) M3a, 15.1(4)M4, 15.1(4)M5, 15.1(4)M6 | 15.1T 15.1(1)T, 15.1(1)T1, 15.1(1)T2, 15.1(1)T3, 15.1 (1) T4, 15.1(1)T5, 15.1(2)T0a, 15.1(2)T1, 15.1(2)T2, 15.1(2)T2a, 15.1(2)T3, 15.1(2)T4, 15.1(2 ) T5, 15.1(3)T, 15.1(3)T1, 15.1(3)T2, 15.1(3)T3, 15.1(3)T4 | 15.1XB 15.1(1)XB, 15.1(1)XB1, 15.1(1 ) XB2, 15.1(1)XB3, 15.1(4)XB4, 15.1(4)XB5, 15.1(4)XB5a, 15.1(4)XB6, 15.1(4)XB7, 15.1(4)XB8a | 15.2GC 15.2(1 ) GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2)GC, 15.2(3)GC, 15.2(3)GC1 | 15.2GCA 15.2(3)GCA | 15.2JA 15.2(2)JA, 15.2 (2) JA1, 15.2(4)JA | 15.2JAX 15.2(2)JAX | 15.2JB 15.2(2)JB, 15.2(2)JB1 | 15.2M 1 5.2(4)M, 15.2(4)M1, 15.2(4)M2 | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2(1)T3a, 15.2(1)T4, 15.2(100)T, 15.2(2)T, 15.2(2)T1, 15.2(2)T2, 15.2(2)T3, 15.2(3)T, 15.2(3)T1, 15.2( 3) T2, 15.2(3)T3 | 15.2XA 15.2(3)XA | 15.2XB 15.2(4)XB10 | 15.3T 15.3(1)T, 15.3(1)T1. Cisco IOS is prone to a remote denial-of-service vulnerability. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCub67465. Vulnerabilities exist in the following versions: Cisco IOS Release 12.2, Releases 15.0 through 15.3
VAR-201309-0446 CVE-2013-5478 Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cisco IOS 15.0 through 15.3 and IOS XE 3.2 through 3.8, when a VRF interface exists, allows remote attackers to cause a denial of service (interface queue wedge) via crafted UDP RSVP packets, aka Bug ID CSCuf17023. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The vulnerability is caused by incorrectly parsing UDP RSVP packets. The attacker can send UDP RSVP packets to the affected device to exploit the vulnerability. Wedge), which can cause link loss, interrupt communication and other denial of service conditions. The following products are affected by this vulnerability: Cisco Cisco IOS XE Software 3.2S .0, .1, .2 | 3.3S .0, .1, .2 | 3.4S .0, .1, .2, .3, .4 | 3.5S .0, .1, .2, Base | 3.6S .0, .1, .2, Base | 3.7S .0, .1, BaseCiscoIOS15.0(1)M1 Base | 15.0M 15.0(1)M , 15.0(1)M10, 15.0(1)M2, 15.0(1)M3, 15.0(1)M4, 15.0(1)M5, 15.0(1)M6, 15.0(1)M6a, 15.0(1)M7, 15.0 (1) M8, 15.0(1)M9 | 15.0SY 15.0(1)SY, 15.0(1)SY1, 15.0(1)SY2, 15.0(1)SY3, 15.0(1)SY4 | 15.0XA 15.0(1)XA , 15.0(1)XA1, 15.0(1)XA2, 15.0(1)XA3, 15.0(1)XA4, 15.0(1)XA5 | 15.1(2)T Base | 15.1EY 15.1(2)EY, 15.1(2) EY1, 15.1(2)EY1a, 15.1(2)EY2, 15.1(2)EY2a, 15.1(2)EY3, 15.1(2)EY4 | 15.1GC 15.1(2)GC, 15.1(2)GC1, 15.1(2) GC2, 15.1(4)GC, 15.1(4)GC1 | 15.1M 15.1(4)M, 15.1(4)M0a, 15.1(4)M0b, 15.1(4)M1, 15.1(4)M2, 15.1(4) M3, 15.1(4)M3a, 15.1(4)M4, 15.1(4)M5, 15.1(4)M6 | 15.1MR 15.1(1)MR, 15.1(1)MR1, 15.1(1)MR2, 15.1(1) MR3, 15.1(1)MR4, 15.1(1)MR5, 15.1(1)MR6, 15.1(3)MR | 15.1MRA 15.1(3)MRA, 15.1(3)MRA1 | 15.1S 15.1(1)S, 15.1( 1) S1, 15.1(1)S2, 15.1(2)S, 15.1(2)S1, 15.1(2)S2, 15.1(3)S, 15.1 (3) S0a, 15.1(3)S1, 15.1(3)S2, 15.1(3)S3, 15.1(3)S4, 15.1(3)S5, 15.1(3)S5a | 15.1SA 15.1(1)SA, 15.1 (1) SA1, 15.1(1)SA2 | 15.1SNG 15.1(2)SNG | 15.1SNH 15.1(2)SNH, 15.1(2)SNH1 | 15.1SNI 15.1(2)SNI | 15.1SY 15.1(1)SY, 15.1 (1) SY1 | 15.1T 15.1(1)T, 15.1(1)T1, 15.1(1)T2, 15.1(1)T3, 15.1(1)T4, 15.1(1)T5, 15.1(2)T0a, 15.1 (2) T1, 15.1(2)T2, 15.1(2)T2a, 15.1(2)T3, 15.1(2)T4, 15.1(2)T5, 15.1(3)T, 15.1(3)T1, 15.1(3 ) T2, 15.1(3)T3, 15.1(3)T4 | 15.1XB 15.1(1)XB, 15.1(1)XB1, 15.1(1)XB2, 15.1(1)XB3, 15.1(4)XB4, 15.1(4 ) XB5, 15.1(4)XB5a, 15.1(4)XB6, 15.1(4)XB7, 15.1(4)XB8a | 15.2GC 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2 ) GC, 15.2(3)GC, 15.2(3)GC1 | 15.2GCA 15.2(3)GCA | 15.2M 15.2(4)M, 15.2(4)M1, 15.2(4)M2, 15.2(4)M3 | 15.2 S 15.2(1)S, 15.2(1)S1, 15.2(1)S2, 15.2(2)S, 15.2(2)S0a, 15.2(2)S0c, 15.2(2)S0d, 15.2(2)S1, 15.2 (2) S2, 15.2(4)S, 15.2(4)S0c, 15.2(4)S1, 15.2(4)S2, 15.2(4)S3, 15.2(4)S3a | 15.2SA 15.2(1)SA | 15.2 SB 15.2(1)SB, 15.2(1)SB1, 15.2(1)SB3, 15.2(1)SB4 | 15.2SC 15.2(1)SC1a | 15.2SNG 15.2(2)SNG | 15 .2SNH 15.2(2)SNH, 15.2(2)SNH1 | 15.2SNI 15.2(2)SNI | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2( 1) T3a, 15.2(1)T4, 15.2(2)T, 15.2(2)T1, 15.2(2)T2, 15.2(2)T3, 15.2(3)T, 15.2(3)T1, 15.2(3) T2, 15.2(3)T3 | 15.2XA 15.2(3)XA | 15.2XB 15.2(4)XB10 | 15.3S 15.3(1)S, 15.3(1)S1, 15.3(1)S1e, 15.3(1)S2 | 15.3T 15.3(1)T, 15.3(1)T1, 15.3(2)T. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuf17023
VAR-201309-0447 CVE-2013-5479 Cisco IOS of DNS-over-TCP Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCtn53730. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A security vulnerability exists in Cisco IOS Software that unauthenticated remote attackers can exploit vulnerabilities to overload devices. The vulnerability is caused by improper processing of DNS packets that need to be translated through the NAT boundary. The attacker uses the vulnerability to continuously send certain DNS packets to the target device. When a malicious packet is processed, a bus error can cause the device to reset. Denial of service attack. The following devices are affected by this vulnerability: Cisco IOS 15.1M 15.1(4)M, 15.1(4)M0a, 15.1(4)M0b, 15.1(4)M1, 15.1(4)M2 | 15.1T 15.1(3)T, 15.1( 3) T1, 15.1(3)T2 | 15.1XB 15.1(4)XB4, 15.1(4)XB5, 15.1(4)XB5a, 15.1(4)XB6 | 15.2GC 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2 | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2(1)T3a, 15.2(1)T4. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCtn53730
VAR-201309-0448 CVE-2013-5480 Cisco IOS of DNS-over-TCP Service disruption in implementations (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCuf28733. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A security vulnerability exists in Cisco IOS Software that unauthenticated remote attackers can exploit vulnerabilities to overload devices. The vulnerability is caused by incorrectly processing DNS packets that need to be translated through the NAT boundary. The attacker uses the vulnerability to continuously send certain DNS packets to the target device. When a malicious packet is processed, an unknown error can cause the device to reset. Denial of service attack. The following devices are affected by this vulnerability: Cisco IOS 15.1 GC 15.1(4)GC, 15.1(4)GC1 | 15.1M 15.1(4)M, 15.1(4)M0a, 15.1(4)M0b, 15.1(4)M1, 15.1( 4) M2, 15.1(4)M3, 15.1(4)M3a, 15.1(4)M4, 15.1(4)M5, 15.1(4)M6 | 15.1T 15.1(3)T, 15.1(3)T1, 15.1( 3) T2, 15.1(3)T3, 15.1(3)T4 | 15.1XB 15.1(4)XB4, 15.1(4)XB5, 15.1(4)XB5a, 15.1(4)XB6, 15.1(4)XB7, 15.1( 4) XB8a | 15.2GC 15.2(1)GC, 15.2(1)GC1, 15.2(1)GC2, 15.2(2)GC, 15.2(3)GC, 15.2(3)GC1 | 15.2GCA 15.2(3)GCA | 15.2JA 15.2(2)JA, 15.2(2)JA1, 15.2(4)JA | 15.2JAX 15.2(2)JAX | 15.2JB 15.2(2)JB, 15.2(2)JB1 | 15.2M 15.2(4)M, 15.2(4)M1, 15.2(4)M2, 15.2(4)M3 | 15.2T 15.2(1)T, 15.2(1)T1, 15.2(1)T2, 15.2(1)T3, 15.2(1)T3a, 15.2(1)T4, 15.2(2)T, 15.2(2)T1, 15.2(2)T2, 15.2(2)T3, 15.2(3)T, 15.2(3)T1, 15.2(3)T2, 15.2( 3) T3 | 15.2XA 15.2(3)XA | 15.2XB 15.2(4)XB10 | 15.3T 15.3(1)T, 15.3(1)T1, 15.3(2)T. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuf28733. Vulnerabilities exist in the following versions: Cisco IOS Release 12.2, Releases 15.0 through 15.3
VAR-201310-0013 CVE-2012-4136 Cisco Unified Computing System Vulnerability in vulnerable fabric interconnect component CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
The high-availability service in the Fabric Interconnect component in Cisco Unified Computing System (UCS) does not properly bind the cluster service to the management interface, which allows remote attackers to obtain sensitive information or cause a denial of service (peer-syncing outage) via a TELNET connection, aka Bug ID CSCtz72910. Vendors report this vulnerability Bug ID CSCtz72910 Published as.By a third party, TELNET Over the connection, important information is obtained or denial of service ( Stop peer synchronization ) May be in a state. Cisco Unified Computing System is prone to a remote security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCtz72910. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0343 CVE-2013-5918 WordPress for Platinum SEO Plug-in platinum_seo_pack.php Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in platinum_seo_pack.php in the Platinum SEO plugin before 1.3.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. The Triangle Research Nano-10 PLC is a controller for automated manufacturing. The Triangle Research Nano-10 PLC has a remote denial of service attack when processing specially crafted messages, allowing remote attackers to crash applications. This vulnerability can be triggered when the firmware is processing a special length (over 0x200) MODBUS TCP message on TCP port 502. The Platinum SEO Pack plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Versions prior to Platinum SEO Pack 1.3.8 are vulnerable
VAR-201309-0011 CVE-2012-4086 Cisco Unified Computing System Arbitrary Command Execution Vulnerability in Fabric Interconnect Device Setup Script CVSS V2: 5.1
CVSS V3: -
Severity: MEDIUM
A setup script for fabric interconnect devices in Cisco Unified Computing System (UCS) allows remote attackers to execute arbitrary commands via invalid parameters, aka Bug ID CSCtg20790. Cisco Unified Computing System is prone to a remote command-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands within the context of the daemon user. This issue is tracked by Cisco Bug ID CSCtg20790. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0005 CVE-2012-4078 Cisco Unified Computing System of Baseboard Management Controller Vulnerabilities that can bypass unspecified authentication steps CVSS V2: 8.5
CVSS V3: -
Severity: HIGH
The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) does not properly handle SSH escape sequences, which allows remote authenticated users to bypass an unspecified authentication step via SSH port forwarding, aka Bug ID CSCtg17656. Cisco Unified Computing System is prone to a remote privilege-escalation vulnerability. An authenticated attacker can exploit this issue to gain access to services with escalated privileges. This issue is tracked by Cisco Bug ID CSCtg17656. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0010 CVE-2012-4085 Cisco Unified Computing System of Blade Management Controller Vulnerable to enumerating valid usernames CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Intelligent Platform Management Interface (IPMI) implementation in the Blade Management Controller in Cisco Unified Computing System (UCS) allows remote attackers to enumerate valid usernames by observing IPMI interface responses, aka Bug ID CSCtg20761. Vendors have confirmed this vulnerability Bug ID CSCtg20761 It is released as.By a third party IPMI By observing the response of the interface, a valid user name may be enumerated. An attacker can exploit this issue to obtain sensitive information; other attacks may also be possible. This issue is being tracked by Cisco Bug ID CSCtg20761. Cisco Unified Computing System (UCS) is a unified computing system of Cisco (Cisco). The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0012 CVE-2012-4087 Cisco Unified Computing System Arbitrary Command Execution Vulnerability in Fabric Interconnect Device Setup Script CVSS V2: 5.1
CVSS V3: -
Severity: MEDIUM
A cluster setup script for fabric interconnect devices in Cisco Unified Computing System (UCS) allows remote attackers to execute arbitrary commands via invalid parameters, aka Bug ID CSCtg20793. Cisco Unified Computing System is prone to a remote command-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands within the context of the daemon user. This issue is tracked by Cisco Bug ID CSCtg20793. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0014 CVE-2012-4089 Cisco Unified Computing System In any Baseboard Management Controller Command execution vulnerability CVSS V2: 6.6
CVSS V3: -
Severity: MEDIUM
MCTOOLS in the fabric interconnect in Cisco Unified Computing System (UCS) allows local users to execute arbitrary Baseboard Management Controller (BMC) commands by leveraging (1) local, (2) shell-level, or (3) debug-level privileges at the operating-system layer, aka Bug ID CSCtg76239. Cisco Unified Computing System is prone to a local command-injection vulnerability. A local attacker can exploit this issue to execute arbitrary commands with elevated privileges. Successful exploits may compromise the affected device. This issue being tracked by Cisco Bug ID CSCtg76239. The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology. The vulnerability stems from the fact that the program does not properly validate the input data in the MCTOOLS command in the FI software
VAR-201309-0017 CVE-2012-4094 Cisco Unified Computing System Buffer Interconnect Vulnerability in Fabric Interconnect CVSS V2: 5.4
CVSS V3: -
Severity: MEDIUM
Buffer overflow in the Smart Call Home feature in the fabric interconnect in Cisco Unified Computing System (UCS) allows remote attackers to cause a denial of service by reading and forging control messages associated with Smart Call Home reports, aka Bug ID CSCtl00198. An attacker can exploit this issue to cause denial-of-service conditions. This issue is tracked by Cisco Bug ID CSCtl00198. Cisco Unified Computing System (UCS) is a unified computing system of Cisco (Cisco). The system integrates network, computing and virtualization resources into one platform by extensively adopting virtualization technology
VAR-201309-0223 CVE-2013-3589 Dell iDRAC 6 and iDRAC 7 are vulnerable to a cross-site scripting (XSS) attack CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the login page in the Administrative Web Interface on Dell iDRAC6 monolithic devices with firmware before 1.96 and iDRAC7 devices with firmware before 1.46.45 allows remote attackers to inject arbitrary web script or HTML via the ErrorMsg parameter. DELL Provided by integrated Dell Remote Access Controller (iDRAC) Contains a cross-site scripting vulnerability. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. This solution provides functions such as remote management, crash recovery and power control for Dell PowerEdge systems
VAR-201309-0440 CVE-2013-5502 Cisco MediaSense of Web Important query strings in the interface or Cookie Vulnerability to obtain information CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The web interface in Cisco MediaSense does not properly protect the client-server communication channel, which allows remote attackers to obtain sensitive query string or cookie information via unspecified vectors, aka Bug ID CSCuj23344. Vendors have confirmed this vulnerability Bug ID CSCuj23344 It is released as.Important query strings or Cookie Information may be obtained. Cisco MediaSense is prone to an information-disclosure vulnerability. A man-in-the-middle attacker may be able to exploit this issue to obtain sensitive information. Information obtained may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCuj23344. Cisco MediaSense is a set of network-based scalable recording platform of Cisco (Cisco). The platform can be used to record speech and video, etc
VAR-201405-0105 CVE-2013-5916 WP e-Commerce Used by plug-ins Wordpress for Bradesco Gateway Plug-in vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in falha.php in the Bradesco Gateway plugin 2.0 for Wordpress, as used in the WP e-Commerce plugin, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING. The Bradesco Gateway plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. WordPress is a set of blogging platform developed by WordPress Software Foundation using PHP language, which supports setting up personal blogging websites on PHP and MySQL servers. Bradesco Gateway is one of the payment gateway plugins
VAR-201310-0800 No CVE Multiple holes exist in FiberHome Modem Router HG-110 CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
FiberHome Modem Router HG-110 is a wireless home gateway product. FiberHome Modem Router HG-110 firmware HG110_BH_V1.6 version has directory traversal and security measures to bypass the vulnerability. Successful exploitation allows remote attackers to bypass authentication and remotely change DNS. Exploiting these issues will allow an attacker to bypass security restrictions, perform unauthorized actions and access, read and execute files outside the webroot folder. Information harvested may aid in launching further attacks