CVE-2012-0354

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

7.1high2.0
0246810

CVSS Score: 7.1/10

All CVSS Scores

CVSS 2.0
7.1

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Description

The Threat Detection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 through 8.2 before 8.2(5.20), 8.3 before 8.3(2.29), 8.4 before 8.4(3), 8.5 before 8.5(1.6), and 8.6 before 8.6(1.1) allows remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger a shun event, aka Bug ID CSCtw35765.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-20

Vulnerable Software (11)

Type: Configuration

Vendor: cisco

Product: 5500_series_adaptive_security_appliance

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: adaptive_security_appliance_software

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6500

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6503-e

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6504-e

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6506-e

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6509-e

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6509-neb-a

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6509-v-e

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd

Type: Configuration

Vendor: cisco

Product: catalyst_6513

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*",          "vulnerable": true        },        {...

Source: nvd