Vulnerabilites related to cisco - pix_506e
Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259.
Impacted products
Vendor Product Version
cisco adaptive_security_appliance 7.2\(3\)
cisco adaptive_security_appliance 7.2\(4\)
cisco adaptive_security_appliance 7.2\(5\)
cisco adaptive_security_appliance 8.0\(2\)
cisco adaptive_security_appliance 8.0\(3\)
cisco adaptive_security_appliance 8.0\(4\)
cisco adaptive_security_appliance 8.0\(5\)
cisco adaptive_security_appliance 8.1\(1\)
cisco adaptive_security_appliance 8.1\(2\)
cisco adaptive_security_appliance 8.2
cisco adaptive_security_appliance 8.2\(1\)
cisco adaptive_security_appliance 8.2\(2\)
cisco adaptive_security_appliance 8.3
cisco adaptive_security_appliance_software 7.2\(1\)
cisco adaptive_security_appliance_software 7.2\(1.22\)
cisco adaptive_security_appliance_software 7.2\(2\)
cisco adaptive_security_appliance_software 7.2\(2.5\)
cisco adaptive_security_appliance_software 7.2\(2.7\)
cisco adaptive_security_appliance_software 7.2\(2.8\)
cisco adaptive_security_appliance_software 7.2\(2.10\)
cisco adaptive_security_appliance_software 7.2\(2.14\)
cisco adaptive_security_appliance_software 7.2\(2.15\)
cisco adaptive_security_appliance_software 7.2\(2.16\)
cisco adaptive_security_appliance_software 7.2\(2.17\)
cisco adaptive_security_appliance_software 7.2\(2.19\)
cisco adaptive_security_appliance_software 7.2\(2.48\)
cisco adaptive_security_appliance_software 8.0
cisco asa_5500 *
cisco asa_5505 *
cisco asa_5510 *
cisco asa_5520 *
cisco asa_5540 *
cisco asa_5550 *
cisco asa_5580 *
cisco pix_500 *
cisco pix_501 *
cisco pix_506e *
cisco pix_firewall_506 *
cisco pix_firewall_515 *
cisco pix_firewall_520 *
cisco pix_firewall_525 *
cisco pix_firewall_535 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Transport Layer Security (TLS) en Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software  v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.10), y v8.3 anteriores a v8.3(1.1) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante secuencias de paquetes TLS manipulados, tambi\u00e9n conocido como Bug ID CSCtf55259."
    }
  ],
  "id": "CVE-2010-2815",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:17.567",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/42198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42198"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352."
    },
    {
      "lang": "es",
      "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.0 anterior a v8.0 (5.23), v8.1 anterior a v8.1 (2.49), v8.2 anterior a v8.2 (4.1), y v8.3 anterior a v8.3 (2.13), cuando una entidad emisora de certificados (CA) est\u00e1 configurada, permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como error ID CSCtk12352"
    }
  ],
  "id": "CVE-2011-0396",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:19.307",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/43488"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id?1025108"
    },
    {
      "source": "[email protected]",
      "url": "http://www.vupen.com/english/advisories/2011/0493"
    },
    {
      "source": "[email protected]",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506.
Impacted products
Vendor Product Version
cisco adaptive_security_appliance 7.2\(3\)
cisco adaptive_security_appliance 7.2\(4\)
cisco adaptive_security_appliance 7.2\(5\)
cisco adaptive_security_appliance 8.0\(2\)
cisco adaptive_security_appliance 8.0\(3\)
cisco adaptive_security_appliance 8.0\(4\)
cisco adaptive_security_appliance 8.0\(5\)
cisco adaptive_security_appliance 8.1\(1\)
cisco adaptive_security_appliance 8.1\(2\)
cisco adaptive_security_appliance 8.2
cisco adaptive_security_appliance 8.2\(1\)
cisco adaptive_security_appliance 8.2\(2\)
cisco adaptive_security_appliance 8.3
cisco adaptive_security_appliance_software 7.2\(1\)
cisco adaptive_security_appliance_software 7.2\(1.22\)
cisco adaptive_security_appliance_software 7.2\(2\)
cisco adaptive_security_appliance_software 7.2\(2.5\)
cisco adaptive_security_appliance_software 7.2\(2.7\)
cisco adaptive_security_appliance_software 7.2\(2.8\)
cisco adaptive_security_appliance_software 7.2\(2.10\)
cisco adaptive_security_appliance_software 7.2\(2.14\)
cisco adaptive_security_appliance_software 7.2\(2.15\)
cisco adaptive_security_appliance_software 7.2\(2.16\)
cisco adaptive_security_appliance_software 7.2\(2.17\)
cisco adaptive_security_appliance_software 7.2\(2.19\)
cisco adaptive_security_appliance_software 7.2\(2.48\)
cisco adaptive_security_appliance_software 8.0
cisco asa_5500 *
cisco asa_5505 *
cisco asa_5510 *
cisco asa_5520 *
cisco asa_5540 *
cisco asa_5550 *
cisco asa_5580 *
cisco pix_500 *
cisco pix_501 *
cisco pix_506e *
cisco pix_firewall_506 *
cisco pix_firewall_515 *
cisco pix_firewall_520 *
cisco pix_firewall_525 *
cisco pix_firewall_535 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Transport Layer Security (TLS) en Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software  v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.17), y v8.3 anteriores a v8.3(1.6) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante secuencias de paquetes TLS manipulados, tambi\u00e9n conocido como Bug ID CSCtf37506."
    }
  ],
  "id": "CVE-2010-2814",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:17.533",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/42196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42196"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC manipulados, tambi\u00e9n conocido como Bug ID CSCtc85753."
    }
  ],
  "id": "CVE-2010-1580",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:16.207",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922.
Impacted products
Vendor Product Version
cisco adaptive_security_appliance 7.2\(3\)
cisco adaptive_security_appliance 7.2\(4\)
cisco adaptive_security_appliance 7.2\(5\)
cisco adaptive_security_appliance 8.0\(2\)
cisco adaptive_security_appliance 8.0\(3\)
cisco adaptive_security_appliance 8.0\(4\)
cisco adaptive_security_appliance 8.0\(5\)
cisco adaptive_security_appliance 8.1\(1\)
cisco adaptive_security_appliance 8.1\(2\)
cisco adaptive_security_appliance 8.2\(1\)
cisco adaptive_security_appliance 8.2\(2\)
cisco adaptive_security_appliance_software 7.2\(1\)
cisco adaptive_security_appliance_software 7.2\(1.22\)
cisco adaptive_security_appliance_software 7.2\(2\)
cisco adaptive_security_appliance_software 7.2\(2.5\)
cisco adaptive_security_appliance_software 7.2\(2.7\)
cisco adaptive_security_appliance_software 7.2\(2.8\)
cisco adaptive_security_appliance_software 7.2\(2.10\)
cisco adaptive_security_appliance_software 7.2\(2.14\)
cisco adaptive_security_appliance_software 7.2\(2.15\)
cisco adaptive_security_appliance_software 7.2\(2.16\)
cisco adaptive_security_appliance_software 7.2\(2.17\)
cisco adaptive_security_appliance_software 7.2\(2.19\)
cisco adaptive_security_appliance_software 7.2\(2.48\)
cisco adaptive_security_appliance_software 8.0
cisco asa_5500 *
cisco asa_5505 *
cisco asa_5510 *
cisco asa_5520 *
cisco asa_5540 *
cisco asa_5550 *
cisco asa_5580 *
cisco pix_500 *
cisco pix_501 *
cisco pix_506e *
cisco pix_firewall_501 *
cisco pix_firewall_506 *
cisco pix_firewall_515 *
cisco pix_firewall_515e *
cisco pix_firewall_520 *
cisco pix_firewall_525 *
cisco pix_firewall_535 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "151D5A44-2D0D-478A-B011-A0892817B814",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "286199EA-71CF-46B4-9131-F1752C2EA82D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC UDP manipulados, tambi\u00e9n conocido como Bug ID CSCtc79922."
    }
  ],
  "id": "CVE-2010-1579",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:16.177",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507.
Impacted products
Vendor Product Version
cisco adaptive_security_appliance 7.0.1
cisco adaptive_security_appliance 7.0.2
cisco adaptive_security_appliance 7.0.3
cisco adaptive_security_appliance 7.0.4
cisco adaptive_security_appliance 7.0.5
cisco adaptive_security_appliance 7.0.6
cisco adaptive_security_appliance 7.0.7
cisco adaptive_security_appliance 7.0.8
cisco adaptive_security_appliance 7.1.1
cisco adaptive_security_appliance 7.1.2
cisco adaptive_security_appliance 7.2\(3\)
cisco adaptive_security_appliance 7.2\(4\)
cisco adaptive_security_appliance 7.2\(5\)
cisco adaptive_security_appliance 8.0\(2\)
cisco adaptive_security_appliance 8.0\(3\)
cisco adaptive_security_appliance 8.0\(4\)
cisco adaptive_security_appliance 8.0\(5\)
cisco adaptive_security_appliance 8.1\(1\)
cisco adaptive_security_appliance 8.1\(2\)
cisco adaptive_security_appliance 8.2
cisco adaptive_security_appliance 8.2\(1\)
cisco adaptive_security_appliance 8.2\(2\)
cisco adaptive_security_appliance 8.3
cisco adaptive_security_appliance_software 7.0
cisco adaptive_security_appliance_software 7.0\(4\)
cisco adaptive_security_appliance_software 7.0\(5\)
cisco adaptive_security_appliance_software 7.0\(5.2\)
cisco adaptive_security_appliance_software 7.0\(6.7\)
cisco adaptive_security_appliance_software 7.0.1.4
cisco adaptive_security_appliance_software 7.0.4.3
cisco adaptive_security_appliance_software 7.1\(2\)
cisco adaptive_security_appliance_software 7.1\(2.5\)
cisco adaptive_security_appliance_software 7.1\(2.27\)
cisco adaptive_security_appliance_software 7.1\(2.48\)
cisco adaptive_security_appliance_software 7.1\(2.49\)
cisco adaptive_security_appliance_software 7.1\(5\)
cisco adaptive_security_appliance_software 7.2\(1\)
cisco adaptive_security_appliance_software 7.2\(1.22\)
cisco adaptive_security_appliance_software 7.2\(2\)
cisco adaptive_security_appliance_software 7.2\(2.5\)
cisco adaptive_security_appliance_software 7.2\(2.7\)
cisco adaptive_security_appliance_software 7.2\(2.8\)
cisco adaptive_security_appliance_software 7.2\(2.10\)
cisco adaptive_security_appliance_software 7.2\(2.14\)
cisco adaptive_security_appliance_software 7.2\(2.15\)
cisco adaptive_security_appliance_software 7.2\(2.16\)
cisco adaptive_security_appliance_software 7.2\(2.17\)
cisco adaptive_security_appliance_software 7.2\(2.19\)
cisco adaptive_security_appliance_software 7.2\(2.48\)
cisco adaptive_security_appliance_software 8.0
cisco asa_5500 *
cisco asa_5505 *
cisco asa_5510 *
cisco asa_5520 *
cisco asa_5540 *
cisco asa_5550 *
cisco asa_5580 *
cisco pix_500 *
cisco pix_501 *
cisco pix_506e *
cisco pix_firewall_506 *
cisco pix_firewall_515 *
cisco pix_firewall_520 *
cisco pix_firewall_525 *
cisco pix_firewall_535 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9952F1BC-68BD-4B32-8707-2A0F185423AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ADB7E0-9436-4479-B2FF-6241BA6DB4A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D2FF90-7A70-464F-A859-1A31F1FF6514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD8078B-570C-4449-97D3-B903B19BAEA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A70C710-CFC6-4503-B2EC-E50DF38CEC76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BDBB7B-2CB1-4F93-861D-BD4962527259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF282A0-9335-44FA-9849-C5273B4E519E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2064D5C-1068-4889-9EB9-1E92D40D60BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9182D1E9-7F10-4C00-89E9-2142551464DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DB5368-63F1-4D55-A9CE-12F307F1CBE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D9649696-DE81-48C7-A276-17E1ECADAD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2649C78C-D742-4E6F-950F-54BF7CF797C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "469CFE0C-6319-46F3-8D31-4850F5E6A830",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "4333600F-0277-4D6C-922E-53FA01CF3C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "35AFDFE9-CCC9-453B-A081-939D1D554379",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "7C82C545-6796-4B67-A97D-0435D41C63C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software v7.0 anteriores a v7.0(8.11), v7.1 y v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.10), y v8.3 anteriores a v8.3(1.1) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes IKE manipulados, tambi\u00e9n conocido como Bug ID CSCte46507."
    }
  ],
  "id": "CVE-2010-2817",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:17.627",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/42190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42190"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SIP en Cisco Adaptive Security Appliances (ASA) para dispositivos serie 5500 con software v8.0 anteriores a v8.0(5.17), v8.1 anteriores a v8.1(2.45), y v8.2 anteriores a v8.2(2.13), permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante paquetes SIP manipulados, tambi\u00e9n conocido como Bug ID CSCtd32106."
    }
  ],
  "id": "CVE-2010-2816",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:17.597",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/42189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42189"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en dispositivos Cisco Adaptive Security Appliances (ASA) serie 5500 con software v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.19), v8.1 anteriores a v8.1(2.47), y v8.2 anteriores a v8.2(2) y Cisco PIX Security Appliances 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC UDP manipulados, tambi\u00e9n conocido como Bug ID CSCtc77567."
    }
  ],
  "id": "CVE-2010-1578",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:16.097",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-09 11:58
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627.
Impacted products
Vendor Product Version
cisco adaptive_security_appliance 7.2\(3\)
cisco adaptive_security_appliance 7.2\(4\)
cisco adaptive_security_appliance 7.2\(5\)
cisco adaptive_security_appliance 8.0\(2\)
cisco adaptive_security_appliance 8.0\(3\)
cisco adaptive_security_appliance 8.0\(4\)
cisco adaptive_security_appliance 8.0\(5\)
cisco adaptive_security_appliance 8.1\(1\)
cisco adaptive_security_appliance 8.1\(2\)
cisco adaptive_security_appliance 8.2
cisco adaptive_security_appliance 8.2\(1\)
cisco adaptive_security_appliance 8.2\(2\)
cisco adaptive_security_appliance 8.3
cisco adaptive_security_appliance_software 7.2\(1\)
cisco adaptive_security_appliance_software 7.2\(1.22\)
cisco adaptive_security_appliance_software 7.2\(2\)
cisco adaptive_security_appliance_software 7.2\(2.5\)
cisco adaptive_security_appliance_software 7.2\(2.7\)
cisco adaptive_security_appliance_software 7.2\(2.8\)
cisco adaptive_security_appliance_software 7.2\(2.10\)
cisco adaptive_security_appliance_software 7.2\(2.14\)
cisco adaptive_security_appliance_software 7.2\(2.15\)
cisco adaptive_security_appliance_software 7.2\(2.16\)
cisco adaptive_security_appliance_software 7.2\(2.17\)
cisco adaptive_security_appliance_software 7.2\(2.19\)
cisco adaptive_security_appliance_software 7.2\(2.48\)
cisco adaptive_security_appliance_software 8.0
cisco asa_5500 *
cisco asa_5505 *
cisco asa_5510 *
cisco asa_5520 *
cisco asa_5540 *
cisco asa_5550 *
cisco asa_5580 *
cisco pix_500 *
cisco pix_501 *
cisco pix_506e *
cisco pix_firewall_506 *
cisco pix_firewall_515 *
cisco pix_firewall_520 *
cisco pix_firewall_525 *
cisco pix_firewall_535 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "06688558-3990-4907-9969-B1462ED82DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F5291408-8B29-48F4-9579-E7130382850F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:7.2\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2BB254-1F22-4445-9A20-45881240C1F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82E4AC-BE77-4A45-839F-45163D64A4C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B521F270-2D51-48BE-BC29-0EDED33FA30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA51CC-2ADA-4527-8D47-D821BBFA5EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9C73F417-0CF4-4E78-9B33-939F0E41994E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "67BABA2F-EE28-4914-8130-6768EC599B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C912270C-6ABB-4149-8E67-96028B45C312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "EB2631B6-F238-4FE3-AA34-703FFB6D6803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1C112-F1C1-4703-8EE0-2FC9F8B233CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC223DE2-90CA-43CD-8EBF-C9C351D10187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la implementaci\u00f3n de Transport Layer Security (TLS) en Cisco Adaptive Security Appliances (ASA) para dispositivos de la serie 5500 con software  v7.2 anteriores a v7.2(5), v8.0 anteriores a v8.0(5.15), v8.1 anteriores a v8.1(2.44), v8.2 anteriores a v8.2(2.17), y v8.3 anteriores a v8.3(1.6) y Cisco PIX Security Appliances para dispositivos de la serie 500, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante secuencias de paquetes TLS manipulados, tambi\u00e9n conocido como Bug ID CSCtd32627."
    }
  ],
  "id": "CVE-2010-1581",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-09T11:58:16.253",
  "references": [
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securityfocus.com/bid/42187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42187"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-25 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "81B53285-7486-47E0-8447-44ECA57A392C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D62E55-845B-49DD-93AA-9D8E7B755F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "33E6756C-407E-4236-85A1-953F9FF6799A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "825E3056-F420-476D-957E-A22B164BD0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CC516FF2-7C0D-4F58-B61B-34FE7294DC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A904D03-264C-4B01-B2B6-12455106B37D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "74826084-14BB-47C4-9EE3-56C3CF206724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA73BA5-D1C5-4561-86F1-5B37C64374E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDEA2295-5B38-45BC-9099-5A448482FB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "31BA0ED9-6962-4E19-89A1-1724AADEC669",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5505:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FB0E87-E81A-4DF8-8A01-0D0727949D87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5510:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFC8F36-ABFD-429F-AC2C-60BB481EECB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBFC985-514D-477B-B881-BB8ABEDFA59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5540:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "193CF237-BBE5-4016-8167-24808FA52CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C9F27-ACE4-416B-9723-2AEECF9AB9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:asa_5580:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5F5BF0-E96E-4FD3-B210-1E0F96AF4249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2706D3BA-37A2-4D71-94DD-5386F5C94374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_501:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0A1E7-F882-4FD8-811A-3D6D0A9FC938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_506e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F353E8D-FE19-4683-BD35-FFBF503C45DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583."
    },
    {
      "lang": "es",
      "value": "Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500  con el software v8.0 anterior a v8.0 (5.20), v8.1 anterior a v8.1 (2.48), v8.2 anterior a v8.2 (3), y v8.3 anterior a v8.3 (2.1), cuando el protocolo RIP y la funcionalidad Cisco Phone  est\u00e1n configuradas, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) a trav\u00e9s de una actualizaci\u00f3n  RIP, tambi\u00e9n conocido como error ID CSCtg66583"
    }
  ],
  "id": "CVE-2011-0395",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "[email protected]",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-25T12:00:19.260",
  "references": [
    {
      "source": "[email protected]",
      "url": "http://secunia.com/advisories/43488"
    },
    {
      "source": "[email protected]",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
    },
    {
      "source": "[email protected]",
      "url": "http://www.securitytracker.com/id?1025108"
    },
    {
      "source": "[email protected]",
      "url": "http://www.vupen.com/english/advisories/2011/0493"
    },
    {
      "source": "[email protected]",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590"
    }
  ],
  "sourceIdentifier": "[email protected]",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "[email protected]",
      "type": "Primary"
    }
  ]
}

CVE-2010-2816 (GCVE-0-2010-2816)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 16:43
Severity ?
Summary
Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:46:48.064Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "42189",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42189"
          },
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "42189",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42189"
        },
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-2816",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the SIP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.17), 8.1 before 8.1(2.45), and 8.2 before 8.2(2.13) allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCtd32106."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "42189",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42189"
            },
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-2816",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-07-23T00:00:00Z",
    "dateUpdated": "2024-09-16T16:43:57.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1579 (GCVE-0-2010-1579)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 22:51
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:28:42.747Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-1579",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-1579",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-04-27T00:00:00Z",
    "dateUpdated": "2024-09-16T22:51:20.084Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1581 (GCVE-0-2010-1581)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 20:23
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:28:41.612Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          },
          {
            "name": "42187",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42187"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        },
        {
          "name": "42187",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42187"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-1581",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtd32627."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            },
            {
              "name": "42187",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42187"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-1581",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-04-27T00:00:00Z",
    "dateUpdated": "2024-09-16T20:23:00.522Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1580 (GCVE-0-2010-1580)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 17:43
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:28:41.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-1580",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc85753."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-1580",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-04-27T00:00:00Z",
    "dateUpdated": "2024-09-16T17:43:02.852Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-1578 (GCVE-0-2010-1578)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 18:38
Severity ?
Summary
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:28:42.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-1578",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc77567."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-1578",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-04-27T00:00:00Z",
    "dateUpdated": "2024-09-16T18:38:41.506Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0395 (GCVE-0-2011-0395)
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:09.044Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
          },
          {
            "name": "1025108",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025108"
          },
          {
            "name": "43488",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43488"
          },
          {
            "name": "ADV-2011-0493",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0493"
          },
          {
            "name": "asa-rip-dos(65590)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
        },
        {
          "name": "1025108",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025108"
        },
        {
          "name": "43488",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43488"
        },
        {
          "name": "ADV-2011-0493",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0493"
        },
        {
          "name": "asa-rip-dos(65590)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2011-0395",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
            },
            {
              "name": "1025108",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025108"
            },
            {
              "name": "43488",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43488"
            },
            {
              "name": "ADV-2011-0493",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0493"
            },
            {
              "name": "asa-rip-dos(65590)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65590"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0395",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:09.044Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0396 (GCVE-0-2011-0396)
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.972Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
          },
          {
            "name": "1025108",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025108"
          },
          {
            "name": "asa-ca-unauth-access(65591)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591"
          },
          {
            "name": "43488",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43488"
          },
          {
            "name": "ADV-2011-0493",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0493"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
        },
        {
          "name": "1025108",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025108"
        },
        {
          "name": "asa-ca-unauth-access(65591)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591"
        },
        {
          "name": "43488",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43488"
        },
        {
          "name": "ADV-2011-0493",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0493"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2011-0396",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml"
            },
            {
              "name": "1025108",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025108"
            },
            {
              "name": "asa-ca-unauth-access(65591)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65591"
            },
            {
              "name": "43488",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43488"
            },
            {
              "name": "ADV-2011-0493",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0493"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2011-0396",
    "datePublished": "2011-02-25T11:00:00",
    "dateReserved": "2011-01-07T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.972Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2814 (GCVE-0-2010-2814)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 18:28
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:46:48.553Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "42196",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42196"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "42196",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42196"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-2814",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "42196",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42196"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-2814",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-07-23T00:00:00Z",
    "dateUpdated": "2024-09-16T18:28:23.271Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2817 (GCVE-0-2010-2817)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-17 00:00
Severity ?
Summary
Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:46:48.150Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "42190",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42190"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "42190",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42190"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-2817",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the IKE implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.10), and 8.3 before 8.3(1.1) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a crafted IKE message, aka Bug ID CSCte46507."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "42190",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42190"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-2817",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-07-23T00:00:00Z",
    "dateUpdated": "2024-09-17T00:00:51.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2815 (GCVE-0-2010-2815)
Vulnerability from cvelistv5
Published
2010-08-06 19:31
Modified
2024-09-16 20:58
Severity ?
Summary
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:46:48.205Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "42198",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42198"
          },
          {
            "name": "40842",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40842"
          },
          {
            "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-06T19:31:00Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "42198",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42198"
        },
        {
          "name": "40842",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40842"
        },
        {
          "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "[email protected]",
          "ID": "CVE-2010-2815",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf55259."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "42198",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/42198"
            },
            {
              "name": "40842",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40842"
            },
            {
              "name": "20100804 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances",
              "refsource": "CISCO",
              "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f12f.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2010-2815",
    "datePublished": "2010-08-06T19:31:00Z",
    "dateReserved": "2010-07-23T00:00:00Z",
    "dateUpdated": "2024-09-16T20:58:54.649Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

OSZAR »