FKIE_CVE-2001-1434
Vulnerability from fkie_nvd - Published: 2001-02-28 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an "snmp-server host" command, which creates a readable "community" community string if one has not been previously created.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.0 | |
| cisco | ios | 12.0\(1\) | |
| cisco | ios | 12.0\(1\)w | |
| cisco | ios | 12.0\(1\)xa3 | |
| cisco | ios | 12.0\(1\)xb | |
| cisco | ios | 12.0\(1\)xe | |
| cisco | ios | 12.0\(2\) | |
| cisco | ios | 12.0\(2\)xc | |
| cisco | ios | 12.0\(2\)xd | |
| cisco | ios | 12.0\(2\)xe | |
| cisco | ios | 12.0\(2\)xf | |
| cisco | ios | 12.0\(2\)xg | |
| cisco | ios | 12.0\(2b\) | |
| cisco | ios | 12.0\(3\) | |
| cisco | ios | 12.0\(3\)t2 | |
| cisco | ios | 12.0\(3d\) | |
| cisco | ios | 12.0\(4\)s | |
| cisco | ios | 12.0\(4\)t | |
| cisco | ios | 12.0\(4\)xe | |
| cisco | ios | 12.0\(4\)xe1 | |
| cisco | ios | 12.0\(4\)xm | |
| cisco | ios | 12.0\(4\)xm1 | |
| cisco | ios | 12.0\(5\)t | |
| cisco | ios | 12.0\(5\)t1 | |
| cisco | ios | 12.0\(5\)wc | |
| cisco | ios | 12.0\(5\)wc2 | |
| cisco | ios | 12.0\(5\)wc2b | |
| cisco | ios | 12.0\(5\)wc3 | |
| cisco | ios | 12.0\(5\)wc3b | |
| cisco | ios | 12.0\(5\)wx | |
| cisco | ios | 12.0\(5\)xe | |
| cisco | ios | 12.0\(5\)xk | |
| cisco | ios | 12.0\(5\)xk2 | |
| cisco | ios | 12.0\(5\)xn | |
| cisco | ios | 12.0\(5\)xn1 | |
| cisco | ios | 12.0\(5\)xs | |
| cisco | ios | 12.0\(5\)xu | |
| cisco | ios | 12.0\(5\)yb4 | |
| cisco | ios | 12.0\(5.1\)xp | |
| cisco | ios | 12.0\(5.2\)xu | |
| cisco | ios | 12.0\(5.3\)wc1 | |
| cisco | ios | 12.0\(5.4\)wc1 | |
| cisco | ios | 12.0\(6b\) | |
| cisco | ios | 12.0\(7\)db2 | |
| cisco | ios | 12.0\(7\)dc1 | |
| cisco | ios | 12.0\(7\)s1 | |
| cisco | ios | 12.0\(7\)sc | |
| cisco | ios | 12.0\(7\)t | |
| cisco | ios | 12.0\(7\)t2 | |
| cisco | ios | 12.0\(7\)wx5\(15a\) | |
| cisco | ios | 12.0\(7\)xe | |
| cisco | ios | 12.0\(7\)xe2 | |
| cisco | ios | 12.0\(7\)xf | |
| cisco | ios | 12.0\(7\)xf1 | |
| cisco | ios | 12.0\(7\)xk | |
| cisco | ios | 12.0\(7\)xk3 | |
| cisco | ios | 12.0\(7\)xv | |
| cisco | ios | 12.0\(7.4\)s | |
| cisco | ios | 12.0\(7a\) | |
| cisco | ios | 12.0\(8\) | |
| cisco | ios | 12.0\(8\)s1 | |
| cisco | ios | 12.0\(8.0.2\)s | |
| cisco | ios | 12.0\(8.3\)sc | |
| cisco | ios | 12.0\(8a\) | |
| cisco | ios | 12.0\(9\) | |
| cisco | ios | 12.0\(9\)s | |
| cisco | ios | 12.0\(9\)s8 | |
| cisco | ios | 12.0\(9a\) | |
| cisco | ios | 12.0\(10\)s7 | |
| cisco | ios | 12.0\(10\)w5 | |
| cisco | ios | 12.0\(10\)w5\(18f\) | |
| cisco | ios | 12.0\(10\)w5\(18g\) | |
| cisco | ios | 12.0\(10a\) | |
| cisco | ios | 12.0\(11\)s6 | |
| cisco | ios | 12.0\(11\)st4 | |
| cisco | ios | 12.0\(11a\) | |
| cisco | ios | 12.0\(12\)s3 | |
| cisco | ios | 12.0\(12a\) | |
| cisco | ios | 12.0\(13\)s6 | |
| cisco | ios | 12.0\(13\)w5\(19c\) | |
| cisco | ios | 12.0\(13\)wt6\(1\) | |
| cisco | ios | 12.0\(13a\) | |
| cisco | ios | 12.0\(14\)s7 | |
| cisco | ios | 12.0\(14\)st | |
| cisco | ios | 12.0\(14\)st3 | |
| cisco | ios | 12.0\(14\)w5\(20\) | |
| cisco | ios | 12.0\(14a\) | |
| cisco | ios | 12.0\(15\)s3 | |
| cisco | ios | 12.0\(15\)s6 | |
| cisco | ios | 12.0\(15a\) | |
| cisco | ios | 12.0\(16\)s8 | |
| cisco | ios | 12.0\(16\)sc3 | |
| cisco | ios | 12.0\(16\)st1 | |
| cisco | ios | 12.0\(16\)w5\(21\) | |
| cisco | ios | 12.0\(16.06\)s | |
| cisco | ios | 12.0\(16a\) | |
| cisco | ios | 12.0\(17\) | |
| cisco | ios | 12.0\(17\)s | |
| cisco | ios | 12.0\(17\)s4 | |
| cisco | ios | 12.0\(17\)sl2 | |
| cisco | ios | 12.0\(17\)sl6 | |
| cisco | ios | 12.0\(17\)st1 | |
| cisco | ios | 12.0\(17\)st5 | |
| cisco | ios | 12.0\(17a\) | |
| cisco | ios | 12.0\(18\)s | |
| cisco | ios | 12.0\(18\)s5 | |
| cisco | ios | 12.0\(18\)st1 | |
| cisco | ios | 12.0\(18\)w5\(22b\) | |
| cisco | ios | 12.0\(18b\) | |
| cisco | ios | 12.0da | |
| cisco | ios | 12.0db | |
| cisco | ios | 12.0dc | |
| cisco | ios | 12.0s | |
| cisco | ios | 12.0sc | |
| cisco | ios | 12.0sl | |
| cisco | ios | 12.0sp | |
| cisco | ios | 12.0st | |
| cisco | ios | 12.0sx | |
| cisco | ios | 12.0t | |
| cisco | ios | 12.0w5 | |
| cisco | ios | 12.0wc | |
| cisco | ios | 12.0wt | |
| cisco | ios | 12.0wx | |
| cisco | ios | 12.0xa | |
| cisco | ios | 12.0xb | |
| cisco | ios | 12.0xc | |
| cisco | ios | 12.0xd | |
| cisco | ios | 12.0xe | |
| cisco | ios | 12.0xf | |
| cisco | ios | 12.0xg | |
| cisco | ios | 12.0xh | |
| cisco | ios | 12.0xi | |
| cisco | ios | 12.0xj | |
| cisco | ios | 12.0xk | |
| cisco | ios | 12.0xl | |
| cisco | ios | 12.0xm | |
| cisco | ios | 12.0xn | |
| cisco | ios | 12.0xp | |
| cisco | ios | 12.0xq | |
| cisco | ios | 12.0xr | |
| cisco | ios | 12.0xs | |
| cisco | ios | 12.0xu | |
| cisco | ios | 12.1 | |
| cisco | ios | 12.1\(20\)e | |
| cisco | ios | 12.1\(20\)e1 | |
| cisco | ios | 12.1\(20\)e2 | |
| cisco | ios | 12.1\(20\)ea1 | |
| cisco | ios | 12.1\(20\)ec | |
| cisco | ios | 12.1\(20\)ec1 | |
| cisco | ios | 12.1\(20\)ew | |
| cisco | ios | 12.1\(20\)ew1 | |
| cisco | ios | 12.1aa | |
| cisco | ios | 12.1ax | |
| cisco | ios | 12.1ay | |
| cisco | ios | 12.1da | |
| cisco | ios | 12.1db | |
| cisco | ios | 12.1dc | |
| cisco | ios | 12.1e | |
| cisco | ios | 12.1ea | |
| cisco | ios | 12.1eb | |
| cisco | ios | 12.1ec | |
| cisco | ios | 12.1eo | |
| cisco | ios | 12.1eu | |
| cisco | ios | 12.1ev | |
| cisco | ios | 12.1ew | |
| cisco | ios | 12.1ex | |
| cisco | ios | 12.1ey | |
| cisco | ios | 12.1m | |
| cisco | ios | 12.1t | |
| cisco | ios | 12.1xa | |
| cisco | ios | 12.1xb | |
| cisco | ios | 12.1xc | |
| cisco | ios | 12.1xd | |
| cisco | ios | 12.1xe | |
| cisco | ios | 12.1xf | |
| cisco | ios | 12.1xg | |
| cisco | ios | 12.1xh | |
| cisco | ios | 12.1xi | |
| cisco | ios | 12.1xj | |
| cisco | ios | 12.1xk | |
| cisco | ios | 12.1xl | |
| cisco | ios | 12.1xm | |
| cisco | ios | 12.1xp | |
| cisco | ios | 12.1xq | |
| cisco | ios | 12.1xr | |
| cisco | ios | 12.1xs | |
| cisco | ios | 12.1xt | |
| cisco | ios | 12.1xu | |
| cisco | ios | 12.1xv | |
| cisco | ios | 12.1xw | |
| cisco | ios | 12.1xx | |
| cisco | ios | 12.1xy | |
| cisco | ios | 12.1xz | |
| cisco | ios | 12.1yb | |
| cisco | ios | 12.1yc | |
| cisco | ios | 12.1yd | |
| cisco | ios | 12.1ye | |
| cisco | ios | 12.1yf | |
| cisco | ios | 12.1yh | |
| cisco | ios | 12.1yi | |
| cisco | ios | 12.1yj |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CFBBDA3-8A5E-407D-8608-45C1BD56BF58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
"matchCriteriaId": "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE210B04-7ECD-419C-9258-0F619A353A8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
"matchCriteriaId": "3B467741-B277-4128-9804-E13ED23FD310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
"matchCriteriaId": "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
"matchCriteriaId": "C48466C4-5A1E-4C71-8822-32D387B36B8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "12551307-4D72-4D24-BA0D-07235EB762AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
"matchCriteriaId": "08E23131-D207-4D98-96D5-2B71FF792604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "593E5730-3777-4DEF-A1D3-73AF0B98448B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF2207E5-7458-40C5-AEF4-73B271EAB3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7109585-1433-4940-B7C9-C561DEAF1498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32B93745-F14C-428E-9A90-47ACE43451EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "4F1B2747-4A9C-44FC-BBA8-39E338B30417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "65176343-0120-4038-844E-FDE48A920270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE67104-9212-4E28-886B-ADFA9503DBBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*",
"matchCriteriaId": "01F9B9CF-787B-4BE0-988C-669531BFFAA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*",
"matchCriteriaId": "43D88280-5701-45EF-99CA-3056AD2216F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCEE111-BEFA-4285-B892-58DE3964F497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA263B60-E7C0-4374-96DF-6E4EB9C16743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17E7C3-53FE-424F-8F47-7B8C70C9807E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*",
"matchCriteriaId": "47E6CE0D-852B-4169-9849-98CDC91E3118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*",
"matchCriteriaId": "DD620020-D5B4-4FE3-AEA5-C43686992F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4705F7-8E36-4C2D-A23C-E6002E459F5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A0DF3A-430D-444F-BD02-D18D10245138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*",
"matchCriteriaId": "F92CF99B-5043-4EDA-965F-3D8F32F9D742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "15295BD6-CC76-41BE-B5A0-A08888207011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*",
"matchCriteriaId": "1423776F-1C73-4872-81F6-29C411B6E545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*",
"matchCriteriaId": "06FA18C8-0152-4035-8C6F-9AAC4B1985B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*",
"matchCriteriaId": "49DB7F15-B0C2-4EF0-A3E7-6DFD03C0A25E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE88EB7-215B-4FCA-82DD-AC2A9D243323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*",
"matchCriteriaId": "763A8E4B-B394-4EB2-829D-70A030551D36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*",
"matchCriteriaId": "198E5016-4494-4BA0-BC9A-C588264F79E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*",
"matchCriteriaId": "83B3A893-6322-4E04-803E-1D18224E7AF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB89FCC-6602-4B41-9BFA-91B0B48827A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*",
"matchCriteriaId": "238DCBE2-E511-42D1-B938-3FA15E4969E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*",
"matchCriteriaId": "10065276-0C45-4B35-8ACC-9EB8A73E5739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C575430A-762A-405F-95DA-92589BF4C611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA412BD-1EFD-4FE2-AC6D-E9AC93B1F750",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E45CDF-F745-4336-B5D2-0917C66C1D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE808362-AFA6-4270-8ECE-8FFD10EE3678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA0B5C8-9BB3-40BC-ADED-3A21DD019A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1720AE47-5ED4-4E5D-AF25-F9FD7E43F6D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2318131B-BA10-4C44-8F90-215CDA28576D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "E83EFCCC-D01E-4F0E-9990-1F323167B430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E737A2B-8B1A-4F53-B1AA-ECB354D10D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*",
"matchCriteriaId": "0C977C71-7F61-444C-A0E4-14E5269E6B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*",
"matchCriteriaId": "533BD959-48CF-4664-B4EC-37314AB93EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC5E6E9-E639-424B-963D-2760B2C38D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED4869D-EB53-4A7B-A630-69B8D76D48DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*",
"matchCriteriaId": "9B5AE2F8-53B5-4B13-A1DB-57E2531943A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "EB26AA22-D05C-4B88-8E1B-63A8EFE6A841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D6833BBD-CB8C-40E3-BCB1-193E0E03A95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "387FCCC1-B05D-4493-9F05-BAC5A0E57F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "33E0F459-8A71-4FAE-BE7A-6C56E28988BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "F7976536-FD4C-4AE7-8838-6E28E0CFE740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D2F695-9A42-4425-8CA6-63CB8E99F893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4E63F87A-7BBB-4619-935E-F1F0C3C7E322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1B6ABDAE-182B-4367-80B6-B8C8ABF92059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA03CF9-26C6-4621-B73C-EBABB20CB250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0B94014A-8415-4174-AF4B-C9026C6EC559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "14E5113C-945B-40CB-9F5C-0B7063704364",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*",
"matchCriteriaId": "75528B66-3966-4299-B9BD-69B039AB2F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09DFBF77-BBE3-41BA-A6C6-32DD555F0AF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "77D178AF-15CB-4352-8193-741F8B49688A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1863F9E2-9FFB-4C19-92E3-15DD9ED72608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "403EE717-FD69-405C-9544-6349CBE09D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF987B2-BA35-4933-85F7-7F3F2C732961",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D77A942A-4A2C-4A87-A866-12B758DB645B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "07E0B16B-D4C1-4140-830F-4F5C0D90AD42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C8355-42F3-43DE-A2D9-0B77138461FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BD6B1C-DDA0-4C64-84C5-68F51BFAB457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B92AE5F7-DD9A-486C-AB39-580E8E29EB75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "45246611-F8E6-4DD5-967B-815048CCAC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3572607D-5E92-4706-8B83-C5CF01E63416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B8E04-A044-4A32-ADB7-9C25B32E9F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*",
"matchCriteriaId": "353010B4-3E37-4451-9B17-EF5701DCE9B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*",
"matchCriteriaId": "828D84E5-E8E4-4425-9E35-B1EBDBE245BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4BC109F5-0907-4CDB-90BD-61788921DABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279DBE65-0402-4205-8820-48EB20386DB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC97D92-C82C-4CBF-93E3-4215B11FD896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "295B139A-50F6-48E7-B42D-9A53BCA3777F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E93E4A5-6D2B-4E79-B713-7CA1BEE0E36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "2657AD4D-F324-4527-9C4F-360946FE0D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD766E23-7CA6-4CC3-9CFF-4E81E370CFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*",
"matchCriteriaId": "39C3D66E-C49F-4A41-B67E-D9DE768356FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09D35D67-529A-425D-800A-D986297D42C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8BD083-812F-414A-8E21-A8119D3ADE7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD09CC38-FBBD-44DD-8322-F642DC8B6F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6342713F-C4C6-4451-9637-B744311EC287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "F95185E5-65CF-478B-B450-2FA9C05E4A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "D281BAB0-994A-418A-8FB9-C8F6509DC56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4444CF9-66F8-4941-8300-4547BA7C164B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*",
"matchCriteriaId": "33C204A1-935D-4CFF-8FBA-9A6E37597E6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA42C30-EB70-4030-9D02-0F3635C980EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*",
"matchCriteriaId": "4A4EE26C-9B9D-41B5-9E0D-46D599EDE8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3F7B649-548F-46B5-BC0C-AB4013CF290F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "3E4D37B0-460F-4F16-B4F4-33A4DB80FC79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "6018992E-1FB3-4ED8-ADC3-3BA49B76165D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEE0CBD-9810-46D0-87B8-0B46926C2F67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6710AB1-42BC-4612-99EB-4E3C9A811E30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BDD3722-C5FC-4AD0-83D3-7E5D2F4B51E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
"matchCriteriaId": "12434A88-88C6-4749-981F-E2B4D725F48F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
"matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6B0C2F-2FBE-4422-AD30-305100C595CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "932C1AC0-0BD1-46DF-A241-AA71BBD785BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
"matchCriteriaId": "5C11A2BE-19E7-4148-B3CC-B4956B07273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*",
"matchCriteriaId": "5A92DCEF-C205-4145-91B0-DB9991130457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B5CC91-144D-4818-871E-E6120A7E1050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*",
"matchCriteriaId": "23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*",
"matchCriteriaId": "C6333F9A-2605-41EE-9AB4-1D04C5825BAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
"matchCriteriaId": "1050ACB3-E5B2-4710-910B-F3DF4B49907F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
"matchCriteriaId": "7977DA9F-41DE-4482-B0CD-896EEEFB5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADAB898-7728-4C14-B69A-7B8B06AFC894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBE69A0-85B1-423B-88FB-CDA80E9186EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
"matchCriteriaId": "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"matchCriteriaId": "54424787-34AC-410D-985F-511ADB2BB144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
"matchCriteriaId": "70F54F0C-AC91-4CB7-9FEB-257F03547864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A0D017-F26F-4429-891E-C7E1C66B6588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"matchCriteriaId": "26FA075D-4A9E-44EE-90CF-23947C9040EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3DFAEC-4534-4A8D-9886-0723F57C7A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"matchCriteriaId": "D162976F-87A3-42BF-8C9F-A981B14F4673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*",
"matchCriteriaId": "E2606209-91BE-4BEB-A163-0D3873A033FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
"matchCriteriaId": "43581A57-418A-4A35-ACF2-1380A8DA8A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D5468-BB6A-4665-964F-D8F636359CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0082D5-CE3E-433A-84E9-1311C8B7899A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C41AB141-A566-4738-8E07-E6410590FB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "F074DF74-81FA-4F09-A6E5-18DD9A4E76C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4041EB0-F402-4C01-9337-212E3E461AF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "0DEB16EF-D0C1-4C56-85B1-3C07D8CFD493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFCFD88F-4320-4F4F-9CAD-BA8A5AA5D389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "379E0F70-EE01-48F9-A4F0-BFCF9BDAB4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*",
"matchCriteriaId": "17CD0C63-7500-4A32-BD85-27E6C2F70FB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
"matchCriteriaId": "442972CD-50D3-4C46-AB73-44AED94B9F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
"matchCriteriaId": "19077C39-A27B-4EC3-A882-9AC826E61570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
"matchCriteriaId": "C9427851-B0DC-4CE6-8BFA-60619D1DC87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
"matchCriteriaId": "6D07DD94-0925-4FEE-9565-5F36B9AAF448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3A67F5-05C6-4097-A88E-0A0F165C12EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
"matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8C5149-40F8-40C9-9FC3-7E7C68801320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
"matchCriteriaId": "B377A8B9-90F2-41B7-9098-5ABEB621E2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*",
"matchCriteriaId": "896A71EC-9508-406F-8DE8-58953D9A30FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B15FCC-1BB3-41CA-9550-6D55DD381F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A85892-C3AB-4920-A949-A71BD0332D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
"matchCriteriaId": "C6330829-9A7B-479D-B38B-BC64148EC172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B13CDA-C376-412A-AF5D-8FC25C74A0A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"matchCriteriaId": "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
"matchCriteriaId": "0E488E6E-87F0-4292-B97B-31087FDB4655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"matchCriteriaId": "0D199CB1-A2A3-4678-9503-C5B61281755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"matchCriteriaId": "80E8AF76-0A1D-4BAE-BF10-D63080352E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*",
"matchCriteriaId": "8A11AF3F-C82F-4431-9CF1-84FDAD388D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
"matchCriteriaId": "3A273401-9394-4BC3-879C-DE3EFC09B3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"matchCriteriaId": "6DABF911-FCDF-4095-A95D-4BB73628FCA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"matchCriteriaId": "677DC4B6-8B3D-4A0D-9934-743FD7494DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E272881F-0804-4190-A21D-3D0B9A774F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"matchCriteriaId": "F084DA16-24CB-41D1-92B7-C6E0499AAD10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"matchCriteriaId": "BA979D75-F60E-45F8-B99C-1402DC8CFCDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"matchCriteriaId": "C1835410-77EB-46F2-ACF0-379759D4B0D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB103ED-B170-4193-84CD-4C59F4D6A10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
"matchCriteriaId": "F88DCCDE-6A81-473F-B4FE-95A84F8DF964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"matchCriteriaId": "63D55886-268F-4E4D-B00F-8A5D97A73BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7C6FB8-8393-4916-BB2B-3097B1995C23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco IOS 12.0(5)XU through 12.1(2) allows remote attackers to read system administration and topology information via an \"snmp-server host\" command, which creates a readable \"community\" community string if one has not been previously created."
}
],
"id": "CVE-2001-1434",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2001-02-28T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/848944"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/848944"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6178"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…