Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cisco NX-OS 4.2, 5.0, 5.1, and 5.2 on Nexus 7000 series switches, when the High Availability (HA) policy is configured for Reset, allows remote attackers to cause a denial of service (device reset) via a malformed Cisco Discovery Protocol (CDP) packet, aka Bug IDs CSCtk34535 and CSCtk19132."}, {"lang": "es", "value": "Cisco NX-OS v4.2, v5.0, v5.1, y v5.2 en los switches de la serie Nexus 7000, cuando la pol\u00edtica High Availability (HA) est\u00e1 configurada para reiniciar, permite a atacantes remotos a provocar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s de un paquete Cisco Discovery Protocol (CDP) malformado, tambi\u00e9n conocido como Bug IDs CSCtk34535 y CSCtk19132."}], "id": "CVE-2012-2469", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-08-06T17:55:00.917", "references": [{"source": "psirt@cisco.com", "url": "http://www.4salesbyself.com/troubleshooting-random-nexus-reboots.aspx"}, {"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/release/notes/52_nx-os_release_note.html"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id?1027352"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.4salesbyself.com/troubleshooting-random-nexus-reboots.aspx"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/release/notes/52_nx-os_release_note.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027352"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}