VAR-200112-0062
Vulnerability from variot - Updated: 2025-04-03 22:16Cisco 12000 with IOS 12.0 and line cards based on Engine 2 and earlier allows remote attackers to cause a denial of service (CPU consumption) by flooding the router with traffic that generates a large number of ICMP Unreachable replies. Cisco 12000 When using a black hole filter in a series internet router, ICMP Service disruption when a large number of unreachable packets are sent (DoS) There is a vulnerability that becomes a condition.ICMP Service operation disruption by sending a large number of unreachable packets (DoS) There is a possibility of being in a state. Cisco 12000 Series Internet Routers are prone to a denial of service condition. Successful exploitation may cause the router to stop forwarding packets. This condition may occur when the router is "Black Hole" filtering. It should be noted that this vulnerability only affects certain Cisco 12000 Series Internet Routers, and other Cisco router products should not be considered vulnerable. Cisco classifies this issue under Vulnerability CSCdr46528, Vulnerability CSCds36541 and Vulnerability CSCdt66560. Engine 2 based Cisco 12000 with IOS 12.0 and line cards and earlier versions are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200112-0062",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "12000 router",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.0"
},
{
"model": "12000 router",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0st",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0sc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0s",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
}
],
"sources": [
{
"db": "BID",
"id": "3534"
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:ios",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This vulnerability was first published in a Cisco Security Advisory.",
"sources": [
{
"db": "BID",
"id": "3534"
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
}
],
"trust": 0.9
},
"cve": "CVE-2001-0861",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2001-0861",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-3668",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2001-0861",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2001-0861",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-200112-018",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-3668",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-3668"
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco 12000 with IOS 12.0 and line cards based on Engine 2 and earlier allows remote attackers to cause a denial of service (CPU consumption) by flooding the router with traffic that generates a large number of ICMP Unreachable replies. Cisco 12000 When using a black hole filter in a series internet router, ICMP Service disruption when a large number of unreachable packets are sent (DoS) There is a vulnerability that becomes a condition.ICMP Service operation disruption by sending a large number of unreachable packets (DoS) There is a possibility of being in a state. Cisco 12000 Series Internet Routers are prone to a denial of service condition. Successful exploitation may cause the router to stop forwarding packets. \nThis condition may occur when the router is \"Black Hole\" filtering. \nIt should be noted that this vulnerability only affects certain Cisco 12000 Series Internet Routers, and other Cisco router products should not be considered vulnerable. \nCisco classifies this issue under Vulnerability CSCdr46528, Vulnerability CSCds36541 and Vulnerability CSCdt66560. Engine 2 based Cisco 12000 with IOS 12.0 and line cards and earlier versions are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2001-0861"
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"db": "BID",
"id": "3534"
},
{
"db": "VULHUB",
"id": "VHN-3668"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "3534",
"trust": 2.8
},
{
"db": "NVD",
"id": "CVE-2001-0861",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "794",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018",
"trust": 0.7
},
{
"db": "XF",
"id": "7536",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20011114 ICMP UNREACHABLE VULNERABILITY IN CISCO 12000 SERIES INTERNET ROUTER",
"trust": 0.6
},
{
"db": "CIAC",
"id": "M-018",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-3668",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-3668"
},
{
"db": "BID",
"id": "3534"
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"id": "VAR-200112-0062",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-3668"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T22:16:57.169000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "GSR-unreachables-pub",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/GSR-unreachables-pub.shtml"
},
{
"title": "GSR-unreachables-pub",
"trust": 0.8,
"url": "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/GSR-unreachables-pub-j.shtml"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/3534"
},
{
"trust": 1.7,
"url": "http://www.ciac.org/ciac/bulletins/m-018.shtml"
},
{
"trust": 1.7,
"url": "http://www.cisco.com/warp/public/707/gsr-unreachables-pub.shtml"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/794"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7536"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0861"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0861"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/static/7536.php"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/warp/public/707/sec_incident_response.shtml"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-3668"
},
{
"db": "BID",
"id": "3534"
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-3668"
},
{
"db": "BID",
"id": "3534"
},
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2001-12-06T00:00:00",
"db": "VULHUB",
"id": "VHN-3668"
},
{
"date": "2001-11-14T00:00:00",
"db": "BID",
"id": "3534"
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"date": "2001-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"date": "2001-12-06T05:00:00",
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-3668"
},
{
"date": "2001-11-14T00:00:00",
"db": "BID",
"id": "3534"
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2001-000175"
},
{
"date": "2005-05-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200112-018"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2001-0861"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco 12000 series Service interruption in Internet routers (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2001-000175"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200112-018"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.