CVE-2000-0700
Published Oct 20, 2000
Last updated 16 years ago
Overview
- Description
- Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526" }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82BFEABB-6E90-4A24-BBE3-2BDB524028A0" }, { "criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B784C9F-79EE-4D08-9D03-985EC7E378FE" }, { "criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC" }, { "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF" }, { "criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A6F8329-15C7-4FED-A61D-5AF4F3A33976" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CFBBDA3-8A5E-407D-8608-45C1BD56BF58" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF2207E5-7458-40C5-AEF4-73B271EAB3C4" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9" }, { "criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1" }, { "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:gigabit_switch_router_12008:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "935E7463-DE83-4743-B51C-A8DB8433E371" }, { "criteria": "cpe:2.3:h:cisco:gigabit_switch_router_12012:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FBF1961-42C5-4570-87A4-C0B962CA5DEF" }, { "criteria": "cpe:2.3:h:cisco:gigabit_switch_router_12016:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E75CA58A-9E97-462D-A745-B6927A350015" } ], "operator": "OR" } ] } ]