Executive Summary

Informations
Name CVE-2012-5017 First vendor Publication 2014-04-23
Vendor Cve Last vendor Modification 2021-10-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:C)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Cisco IOS before 15.1(1)SY1 allows remote authenticated users to cause a denial of service (device reload) by establishing a VPN session and then sending malformed IKEv2 packets, aka Bug ID CSCub39268.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5017

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 1
Hardware 286
Os 5530

Sources (Detail)

Source Url
CONFIRM http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/rel...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Date Informations
2024-03-07 01:19:18
  • Multiple Updates
2023-10-06 01:17:41
  • Multiple Updates
2023-08-12 12:23:31
  • Multiple Updates
2023-08-12 01:06:05
  • Multiple Updates
2023-08-11 12:19:42
  • Multiple Updates
2023-08-11 01:06:15
  • Multiple Updates
2023-08-06 12:18:57
  • Multiple Updates
2023-08-06 01:06:06
  • Multiple Updates
2023-08-04 12:19:01
  • Multiple Updates
2023-08-04 01:06:08
  • Multiple Updates
2023-07-14 12:18:59
  • Multiple Updates
2023-07-14 01:06:03
  • Multiple Updates
2023-05-10 01:16:05
  • Multiple Updates
2023-03-29 01:20:58
  • Multiple Updates
2023-03-28 12:06:11
  • Multiple Updates
2022-10-11 12:16:58
  • Multiple Updates
2022-10-11 01:05:46
  • Multiple Updates
2022-09-03 12:14:51
  • Multiple Updates
2021-10-13 00:23:14
  • Multiple Updates
2021-10-08 09:23:10
  • Multiple Updates
2021-10-05 21:23:35
  • Multiple Updates
2021-08-26 01:11:13
  • Multiple Updates
2021-05-08 01:10:34
  • Multiple Updates
2021-04-22 01:25:57
  • Multiple Updates
2021-04-01 01:09:43
  • Multiple Updates
2020-06-11 01:09:16
  • Multiple Updates
2020-06-10 01:07:48
  • Multiple Updates
2020-06-09 01:08:12
  • Multiple Updates
2020-05-24 01:09:42
  • Multiple Updates
2020-05-23 01:49:52
  • Multiple Updates
2020-05-23 00:34:51
  • Multiple Updates
2019-10-05 12:05:05
  • Multiple Updates
2019-09-28 12:05:05
  • Multiple Updates
2019-05-22 12:03:05
  • Multiple Updates
2019-04-03 12:03:40
  • Multiple Updates
2019-01-01 12:04:34
  • Multiple Updates
2018-11-27 12:04:40
  • Multiple Updates
2018-07-21 12:02:45
  • Multiple Updates
2018-04-25 12:04:24
  • Multiple Updates
2018-04-22 12:01:06
  • Multiple Updates
2017-10-07 12:01:56
  • Multiple Updates
2017-09-19 12:03:12
  • Multiple Updates
2017-08-30 01:02:18
  • Multiple Updates
2017-08-17 12:05:35
  • Multiple Updates
2017-07-22 12:02:29
  • Multiple Updates
2017-04-06 12:03:54
  • Multiple Updates
2016-12-17 01:03:07
  • Multiple Updates
2016-10-08 01:01:06
  • Multiple Updates
2016-09-22 12:01:17
  • Multiple Updates
2016-07-16 12:00:54
  • Multiple Updates
2016-06-28 22:05:31
  • Multiple Updates
2016-04-26 22:20:29
  • Multiple Updates
2014-04-23 21:21:10
  • Multiple Updates
2014-04-23 17:19:45
  • First insertion