Vulnerability Details : CVE-2011-4231
Cisco IOS 15.1 and 15.2 and IOS XE 3.x, when configured as an IPsec hub with X.509 certificates in use, allows remote authenticated users to cause a denial of service (segmentation fault and device crash) via unspecified vectors, aka Bug ID CSCtq61128.
Vulnerability category: Memory CorruptionInput validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-4231
Probability of exploitation activity in the next 30 days: 0.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 38 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-4231
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.3
|
MEDIUM | AV:N/AC:M/Au:S/C:N/I:N/A:C |
6.8
|
6.9
|
NIST |
CWE ids for CVE-2011-4231
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4231
-
http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-4MCAVS.html
Cross-Platform Release Notes for Cisco IOS Release 15.1M&T - Release 15.1(4)M Caveats [Cisco IOS 15.1M&T] - CiscoVendor Advisory
-
http://www.cisco.com/en/US/docs/ios/ios_xe/3/release/notes/asr1k_caveats_34s.html
Cisco IOS XE 3S Release Notes - Release 3.4S Caveats [Cisco IOS XE 3S] - CiscoVendor Advisory
Products affected by CVE-2011-4231
- cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.1sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.1.0sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*