Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2012-5017 |
Cisco IOS before 15.1(1)SY1 allows remote authenticated users to cause a denial of service (device reload) by establishing a VPN session and then sending malformed IKEv2 packets, aka Bug ID CSCub39268. Published: April 23, 2014; 7:52:59 AM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2012-5032 |
The Flex-VPN load-balancing feature in the ipsec-ikev2 implementation in Cisco IOS before 15.1(1)SY3 does not require authentication, which allows remote attackers to trigger the forwarding of VPN traffic to an attacker-controlled destination, or the discarding of this traffic, by arranging for an arbitrary device to become a cluster member, aka Bug ID CSCub93641. Published: April 23, 2014; 7:52:59 AM -0400 |
V3.x:(not available) V2.0: 6.4 MEDIUM |
CVE-2012-4658 |
The ios-authproxy implementation in Cisco IOS before 15.1(1)SY3 allows remote attackers to cause a denial of service (webauth and HTTP service outage) via vectors that trigger incorrectly terminated HTTP sessions, aka Bug ID CSCtz99447. Published: April 23, 2014; 7:52:59 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2012-5014 |
Cisco IOS before 15.1(2)SY allows remote authenticated users to cause a denial of service (device crash) by establishing an SSH session from a client and then placing this client into a (1) slow or (2) idle state, aka Bug ID CSCto87436. Published: April 23, 2014; 7:52:59 AM -0400 |
V3.x:(not available) V2.0: 6.3 MEDIUM |
CVE-2012-4651 |
Cisco IOS before 15.3(2)T, when scansafe is enabled, allows remote attackers to cause a denial of service (latency) via SYN packets that are not accompanied by SYN-ACK packets from the Scan Safe Tower, aka Bug ID CSCub85451. Published: April 23, 2014; 7:52:59 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2012-3918 |
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317. Published: April 23, 2014; 7:52:59 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2014-2143 |
The IKE implementation in Cisco IOS 15.4(1)T and earlier and IOS XE allows remote attackers to cause a denial of service (security-association drop) via crafted Main Mode packets, aka Bug ID CSCun31021. Published: April 04, 2014; 11:10:37 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2014-2131 |
The packet driver in Cisco IOS allows remote attackers to cause a denial of service (device reload) via a series of (1) Virtual Switching Systems (VSS) or (2) Bidirectional Forwarding Detection (BFD) packets, aka Bug IDs CSCug41049 and CSCue61890. Published: March 28, 2014; 9:55:07 PM -0400 |
V3.x:(not available) V2.0: 6.1 MEDIUM |
CVE-2014-2124 |
Cisco IOS 15.1(2)SY3 and earlier, when used with Supervisor Engine 2T (aka Sup2T) on Catalyst 6500 devices, allows remote attackers to cause a denial of service (device crash) via crafted multicast packets, aka Bug ID CSCuf60783. Published: March 20, 2014; 9:04:02 PM -0400 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2013-6705 |
The IP Device Tracking (IPDT) feature in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (IPDT AVL corruption and device reload) via a crafted sequence of ARP packets, aka Bug ID CSCuh38133. Published: December 03, 2013; 2:56:32 PM -0500 |
V3.x:(not available) V2.0: 6.1 MEDIUM |
CVE-2013-6694 |
The IPSec implementation in Cisco IOS allows remote attackers to cause a denial of service (MTU change and tunnel-session drop) via crafted ICMP packets, aka Bug ID CSCul29918. Published: November 22, 2013; 2:55:09 PM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2013-6693 |
The MLDP implementation in Cisco IOS 15.3(3)S and earlier on 7600 routers, when many VRFs are configured, allows remote attackers to cause a denial of service (chunk corruption and device reload) by establishing many multicast flows, aka Bug ID CSCue22345. Published: November 21, 2013; 8:55:04 PM -0500 |
V3.x:(not available) V2.0: 5.4 MEDIUM |
CVE-2013-6686 |
The SSL VPN implementation in Cisco IOS 15.3(1)T2 and earlier allows remote authenticated users to cause a denial of service (interface queue wedge) via crafted DTLS packets in an SSL session, aka Bug IDs CSCuh97409 and CSCud90568. Published: November 17, 2013; 10:55:06 PM -0500 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2013-5552 |
Cisco IOS 12.4(24)MDB9 and earlier on Content Services Gateway (CSG) devices does not properly implement the "parse error drop" feature, which allows remote attackers to bypass intended access restrictions via a crafted series of packets, aka Bug ID CSCug90143. Published: November 13, 2013; 10:55:03 AM -0500 |
V3.x:(not available) V2.0: 6.4 MEDIUM |
CVE-2013-5548 |
The IKEv2 implementation in Cisco IOS, when AES-GCM or AES-GMAC is used, allows remote attackers to bypass certain IPsec anti-replay features via IPsec tunnel traffic, aka Bug ID CSCuj47795. Published: October 31, 2013; 10:55:04 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2013-5522 |
Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286. Published: October 24, 2013; 11:52:54 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2013-5527 |
The OSPF functionality in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted options in an LSA type 11 packet, aka Bug ID CSCui21030. Published: October 10, 2013; 6:55:06 AM -0400 |
V3.x:(not available) V2.0: 5.7 MEDIUM |
CVE-2013-5499 |
The remember feature in the DHCP server in Cisco IOS allows remote attackers to cause a denial of service (device reload) by acquiring a lease and then sending a DHCPRELEASE message, aka Bug ID CSCuh46822. Published: October 10, 2013; 6:55:06 AM -0400 |
V3.x:(not available) V2.0: 5.7 MEDIUM |
CVE-2013-5469 |
The TCP implementation in Cisco IOS does not properly implement the transitions from the ESTABLISHED state to the CLOSED state, which allows remote attackers to cause a denial of service (flood of ACK packets) via a crafted series of ACK and FIN packets, aka Bug ID CSCtz14399. Published: August 30, 2013; 4:55:08 PM -0400 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2013-3436 |
The default configuration of the Group Encrypted Transport VPN (GET VPN) feature on Cisco IOS uses an improper mechanism for enabling Group Domain of Interpretation (GDOI) traffic flow, which allows remote attackers to bypass the encryption policy via certain uses of UDP port 848, aka Bug ID CSCui07698. Published: July 19, 2013; 10:36:13 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |