The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00633.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 2820
Subscribe
Catalyst 2900
Subscribe
Catalyst 2900 Vlan
Subscribe
Catalyst 2900xl
Subscribe
Catalyst 2901
Subscribe
Catalyst 2902
Subscribe
Catalyst 2920
Subscribe
Catalyst 2926
Subscribe
Catalyst 2926f
Subscribe
Catalyst 2926gl
Subscribe
Catalyst 2926gs
Subscribe
Catalyst 2926t
Subscribe
Catalyst 2940
Subscribe
Catalyst 2948
Subscribe
Catalyst 2948-ge-tx
Subscribe
Catalyst 2948g
Subscribe
Catalyst 2948g-l3
Subscribe
Catalyst 2950
Subscribe
Catalyst 2950 Lre
Subscribe
Catalyst 2955
Subscribe
Catalyst 2970
Subscribe
Catalyst 2980g
Subscribe
Catalyst 2980g-a
Subscribe
Catalyst 3000
Subscribe
Catalyst 3200
Subscribe
Catalyst 3500
Subscribe
Catalyst 3500 Xl
Subscribe
Catalyst 3500xl
Subscribe
Catalyst 3550
Subscribe
Catalyst 3560
Subscribe
Catalyst 3560-e
Subscribe
Catalyst 3560-x
Subscribe
Catalyst 3750
Subscribe
Catalyst 3750-e
Subscribe
Catalyst 3750-x
Subscribe
Catalyst 3750 Metro
Subscribe
Catalyst 3750g
Subscribe
Catalyst 3900
Subscribe
Catalyst 4000
Subscribe
Catalyst 4200
Subscribe
Catalyst 4224
Subscribe
Catalyst 4232
Subscribe
Catalyst 4232-13
Subscribe
Catalyst 4500
Subscribe
Catalyst 4503
Subscribe
Catalyst 4506
Subscribe
Catalyst 4507r
Subscribe
Catalyst 4510r
Subscribe
Catalyst 4840g
Subscribe
Catalyst 4908g-l3
Subscribe
Catalyst 4912g
Subscribe
Catalyst 4948
Subscribe
Catalyst 5000
Subscribe
Catalyst 5500
Subscribe
Catalyst 5505
Subscribe
Catalyst 5509
Subscribe
Catalyst 6000
Subscribe
Catalyst 6000 Ws-svc-nam-1
Subscribe
Catalyst 6000 Ws-svc-nam-2
Subscribe
Catalyst 6000 Ws-x6380-nam
Subscribe
Catalyst 6500
Subscribe
Catalyst 6500 Ws-svc-nam-1
Subscribe
Catalyst 6500 Ws-svc-nam-2
Subscribe
Catalyst 6500 Ws-x6380-nam
Subscribe
Catalyst 6503-e
Subscribe
Catalyst 6504-e
Subscribe
Catalyst 6506-e
Subscribe
Catalyst 6509-e
Subscribe
Catalyst 6509-neb-a
Subscribe
Catalyst 6509-v-e
Subscribe
Catalyst 6513
Subscribe
Catalyst 6513-e
Subscribe
Catalyst 6608
Subscribe
Catalyst 6624
Subscribe
Catalyst 7600
Subscribe
Catalyst 7600 Ws-svc-nam-1
Subscribe
Catalyst 7600 Ws-svc-nam-2
Subscribe
Catalyst 7600 Ws-x6380-nam
Subscribe
Catalyst 8500
Subscribe
Catalyst 8510csr
Subscribe
Catalyst 8510msr
Subscribe
Catalyst 8540csr
Subscribe
Catalyst 8540msr
Subscribe
Catalyst Ws-c2924-xl
Subscribe
Ios
Subscribe
|
Configuration 1 [-]
| AND |
|
No data.
No data.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-1140 | The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-09-16T18:14:13.971Z
Reserved: 2013-01-11T00:00:00Z
Link: CVE-2013-1100
No data.
Status : Deferred
Published: 2013-02-13T23:55:01.117
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-1100
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD