Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-2862 | First vendor Publication | 2009-09-28 |
Vendor | Cve | Last vendor Modification | 2022-06-02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Object Groups for Access Control Lists (ACLs) feature in Cisco IOS 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to bypass intended access restrictions via crafted requests, aka Bug IDs CSCsx07114, CSCsu70214, CSCsw47076, CSCsv48603, CSCsy54122, and CSCsu50252. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2862 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 7 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
58338 | Cisco IOS Object-group Access Control List Unspecified Bypass |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20090923-aclhttp.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2022-06-02 21:27:34 |
|
2021-05-04 12:09:58 |
|
2021-04-22 01:10:21 |
|
2020-05-23 00:24:11 |
|
2016-06-28 17:48:01 |
|
2014-02-17 10:51:16 |
|
2013-05-10 23:55:47 |
|