Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "74868197-D48D-43DE-A65B-A56369DA6502", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F72BB334-B050-4B52-868A-49250EF1E845", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "86DFEFB7-A745-4D5F-A1AB-F6E3971894A1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "D3181F43-6CB7-47C1-A68A-432995454F14", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33A3DD4F-CD94-4BD7-9365-4ED26872697E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5DA712-F36D-4755-9158-57A5B0F95BE6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4AA71976-7561-4B9D-BFB3-87A06711EB46", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5732020-BB4A-4F87-B63A-31BD439FE3AA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "493B34EA-B262-4123-958C-C2B563A66A7F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C8F81C8-99D5-40CA-972A-71EB0CF43FA2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF07192-27C3-47DA-A3EA-C5FA84A43ADF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6716B573-328C-455E-AB36-315DD6588AA3", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CB3A6B4-C567-4E96-A735-74F50C7A6906", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "259252A1-C0B1-4679-B04E-29DDDB4ACAD1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B944351-D4ED-42A1-969E-B7DC864B0CBB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "51D7EBD7-2BEA-4C30-9E89-A9913EE268C8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8F281A7-0C77-46A2-8838-D3E9207FB85D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C3DCF01-326D-44A1-ADAB-CF52F7629082", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D63186-5834-448C-98F2-0C189A11D25D", "vulnerable": false}, {"criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61710."}, {"lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica de inspecci\u00f3n SunRPC en el m\u00f3dulo Cisco Firewall Services Module (FWSM) con software v3.1 anteriores a v3.1(17.2), v3.2 anteriores a v3.2(16.1), v4.0 anteriores a v4.0(10.1), y v4.1 anteriores a v4.1(1.1) para switchs serie Catalyst 6500 y routers serie 7600, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante un mensajes SunRPC manipulados, tambi\u00e9n conocido como Bug ID CSCte61710."}], "id": "CVE-2010-2818", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-08-09T11:58:17.660", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/40843"}, {"source": "psirt@cisco.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/40843"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.shtml"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}