ID

VAR-201404-0044


CVE

CVE-2012-5723


TITLE

Cisco ASR 1000 Denial of service in the software of a series of devices (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-006208

DESCRIPTION

Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948. The Cisco ASR 1000 Series Aggregation Services Routers drive the transformation of service providers and enterprise network edge areas with their compact form factor, industry-leading performance, instant service capabilities and high smoothness. The Cisco ASR 1000 Series Routers are prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause the affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCub55948

Trust: 2.52

sources: NVD: CVE-2012-5723 // JVNDB: JVNDB-2012-006208 // CNVD: CNVD-2014-04080 // BID: 68242 // VULHUB: VHN-59004

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-04080

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.1\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.2\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7s\(.0\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6.1s

Trust: 1.6

vendor:ciscomodel:asr 1013scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xescope:lteversion:3.7s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.0s

Trust: 1.0

vendor:ciscomodel:asr 1002 fixed routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1001scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1006scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1023 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1002-xscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 1004scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xe 3.6sscope: - version: -

Trust: 0.9

vendor:ciscomodel:asr 1001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 fixed routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1002-x routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1004 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1013 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 1023 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope:ltversion:3.8s

Trust: 0.8

vendor:ciscomodel:asr 3.8sscope:eqversion:1000<

Trust: 0.6

vendor:ciscomodel:ios xe 3.7sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.7s\(.1\)

Trust: 0.6

vendor:ciscomodel:ios xe 3.7.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.7.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:10130

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:10060

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:10040

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1002x0

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:10020

Trust: 0.3

vendor:ciscomodel:asr fixed routerscope:eqversion:10020

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1023

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1001

Trust: 0.3

vendor:ciscomodel:ios xe 3.8sscope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2014-04080 // BID: 68242 // JVNDB: JVNDB-2012-006208 // CNNVD: CNNVD-201404-494 // NVD: CVE-2012-5723

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5723
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-5723
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-04080
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201404-494
value: MEDIUM

Trust: 0.6

VULHUB: VHN-59004
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-5723
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-04080
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-59004
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-04080 // VULHUB: VHN-59004 // JVNDB: JVNDB-2012-006208 // CNNVD: CNNVD-201404-494 // NVD: CVE-2012-5723

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-59004 // JVNDB: JVNDB-2012-006208 // NVD: CVE-2012-5723

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201404-494

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201404-494

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-006208

PATCH

title:Release 3.8S Caveatsurl:http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html

Trust: 0.8

title:Patch for Cisco ASR 1000 System Router Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/47163

Trust: 0.6

title:Cisco ASR 1000 Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164611

Trust: 0.6

sources: CNVD: CNVD-2014-04080 // JVNDB: JVNDB-2012-006208 // CNNVD: CNNVD-201404-494

EXTERNAL IDS

db:NVDid:CVE-2012-5723

Trust: 3.4

db:BIDid:68242

Trust: 1.0

db:JVNDBid:JVNDB-2012-006208

Trust: 0.8

db:CNNVDid:CNNVD-201404-494

Trust: 0.7

db:CNVDid:CNVD-2014-04080

Trust: 0.6

db:VULHUBid:VHN-59004

Trust: 0.1

sources: CNVD: CNVD-2014-04080 // VULHUB: VHN-59004 // BID: 68242 // JVNDB: JVNDB-2012-006208 // CNNVD: CNNVD-201404-494 // NVD: CVE-2012-5723

REFERENCES

url:http://www.cisco.com/c/en/us/td/docs/routers/asr1000/release/notes/asr1k_rn_rel_notes/asr1k_caveats_38s.html

Trust: 2.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5723

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5723

Trust: 0.8

url:http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/software_packaging_architecture.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2014-04080 // VULHUB: VHN-59004 // BID: 68242 // JVNDB: JVNDB-2012-006208 // CNNVD: CNNVD-201404-494 // NVD: CVE-2012-5723

CREDITS

Cisco

Trust: 0.3

sources: BID: 68242

SOURCES

db:CNVDid:CNVD-2014-04080
db:VULHUBid:VHN-59004
db:BIDid:68242
db:JVNDBid:JVNDB-2012-006208
db:CNNVDid:CNNVD-201404-494
db:NVDid:CVE-2012-5723

LAST UPDATE DATE

2024-08-14T13:35:11.783000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-04080date:2014-07-14T00:00:00
db:VULHUBid:VHN-59004date:2014-04-24T00:00:00
db:BIDid:68242date:2014-04-24T00:00:00
db:JVNDBid:JVNDB-2012-006208date:2014-04-28T00:00:00
db:CNNVDid:CNNVD-201404-494date:2021-10-08T00:00:00
db:NVDid:CVE-2012-5723date:2021-10-05T14:51:27.033

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-04080date:2014-07-07T00:00:00
db:VULHUBid:VHN-59004date:2014-04-24T00:00:00
db:BIDid:68242date:2014-04-24T00:00:00
db:JVNDBid:JVNDB-2012-006208date:2014-04-28T00:00:00
db:CNNVDid:CNNVD-201404-494date:2014-04-28T00:00:00
db:NVDid:CVE-2012-5723date:2014-04-24T10:55:02.320