CVE-2010-0151
Published Feb 19, 2010
Last updated 7 years ago
Overview
- Description
- The Cisco Firewall Services Module (FWSM) 4.0 before 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote attackers to cause a denial of service (crash) via a malformed Skinny Client Control Protocol (SCCP) message.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- -
- Impact
- Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910e.shtml "All non-fixed 4.x versions of Cisco FWSM Software are affected by this vulnerability if SCCP inspection is enabled. SCCP inspection is enabled by default."
- Solution
- Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1910e.shtml "All non-fixed 4.x versions of Cisco FWSM Software are affected by this vulnerability if SCCP inspection is enabled. SCCP inspection is enabled by default."
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firewall_services_module:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26535762-EE50-4C4F-831E-A0ABFF4ADAF0" }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:4.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADDB8F07-38B4-498D-9455-9414B69A0626" }, { "criteria": "cpe:2.3:h:cisco:firewall_services_module:4.0\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5113E779-7205-4761-9B5D-E6B254F48F49" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301" }, { "criteria": "cpe:2.3:h:cisco:5505_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DE68D7A3-E7A5-4739-8808-2B5FB61F9CED" }, { "criteria": "cpe:2.3:h:cisco:5510_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "38121FAF-1F69-415A-A62D-DBEE90729F01" }, { "criteria": "cpe:2.3:h:cisco:5520_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D94FFC7A-43F7-4292-864B-56CC978375AF" }, { "criteria": "cpe:2.3:h:cisco:5540_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9BC7F46C-AADA-4D82-AA3C-28563A41FCCB" }, { "criteria": "cpe:2.3:h:cisco:5550_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1A592194-AF27-493F-8200-DFB8EAB6BCE8" }, { "criteria": "cpe:2.3:h:cisco:5580_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C1952453-31B6-4FDD-955B-C46C065EB81B" }, { "criteria": "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6FCBA3A3-7C8F-481A-9BEC-78981547F8BE" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589" }, { "criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D" } ], "operator": "OR" } ], "operator": "AND" } ]