Vulnerability Description
Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote attackers to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Firewall Services Module Software | 3.2 |
| Cisco | Catalyst 6500 | All versions |
| Cisco | Catalyst 7600 | All versions |
| Cisco | Firewall Services Module | All versions |
References
- http://secunia.com/advisories/40843Vendor Advisory
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.sPatchVendor Advisory
- http://secunia.com/advisories/40843Vendor Advisory
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3f130.sPatchVendor Advisory
FAQ
What is CVE-2010-2821?
CVE-2010-2821 is a vulnerability with a CVSS score of 7.1 (HIGH). Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 before 3.2(17.2), 4.0 before 4.0(11.1), and 4.1 before 4.1(1.2) for Catalyst 6500 series switches and 7600 seri...
How severe is CVE-2010-2821?
CVE-2010-2821 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-2821?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Firewall Services Module Software, Cisco Catalyst 6500, Cisco Catalyst 7600, Cisco Firewall Services Module.