Show plain JSON{"id": "CVE-2000-0700", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2000-10-20T04:00:00.000", "references": [{"url": "http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/793", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/798", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/1541", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.cisco.com/warp/public/707/gsraclbypassdos-pub.shtml", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/793", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/798", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/1541", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8026B11-6144-467F-8094-F4F73CD37526"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82BFEABB-6E90-4A24-BBE3-2BDB524028A0"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B784C9F-79EE-4D08-9D03-985EC7E378FE"}, {"criteria": "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF"}, {"criteria": "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A6F8329-15C7-4FED-A61D-5AF4F3A33976"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CFBBDA3-8A5E-407D-8608-45C1BD56BF58"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF2207E5-7458-40C5-AEF4-73B271EAB3C4"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9"}, {"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1"}, {"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:gigabit_switch_router_12008:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "935E7463-DE83-4743-B51C-A8DB8433E371"}, {"criteria": "cpe:2.3:h:cisco:gigabit_switch_router_12012:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FBF1961-42C5-4570-87A4-C0B962CA5DEF"}, {"criteria": "cpe:2.3:h:cisco:gigabit_switch_router_12016:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E75CA58A-9E97-462D-A745-B6927A350015"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}