CVE-2003-0512
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cisco IOS 12.2 and earlier generates a "% Login invalid" message instead of prompting for a password when an invalid username is provided, which allows remote attackers to identify valid usernames on the system and conduct brute force password guessing, as reported for the Aironet Bridge.
Cisco IOS 12.2 y anteriores genera un mensaje "% Login Invalid" en vez de solicitar una contraseña cuando se suministra un nombre de usuario inválido, lo que permite a atacantes remotos identificar nombres de usuario válidos e intentar averiguar la contraseña con métodos de fuerza bruta, como ha informado Aironet Bridge.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2003-07-07 CVE Reserved
- 2003-07-29 CVE Published
- 2024-05-26 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-310: Cryptographic Issues
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.kb.cert.org/vuls/id/886796 | Third Party Advisory | |
http://www.vigilante.com/inetsecurity/advisories/VIGILANTE-2003002.htm | X_refsource_misc | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5824 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0056.html | 2017-10-11 | |
http://www.cisco.com/warp/public/707/cisco-sn-20030724-ios-enum.shtml | 2017-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.0\(24\)s1 Search vendor "Cisco" for product "Ios" and version "12.0\(24\)s1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.0\(24.2\)s Search vendor "Cisco" for product "Ios" and version "12.0\(24.2\)s" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(11\)ja1 Search vendor "Cisco" for product "Ios" and version "12.2\(11\)ja1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(14.5\) Search vendor "Cisco" for product "Ios" and version "12.2\(14.5\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(14.5\)t Search vendor "Cisco" for product "Ios" and version "12.2\(14.5\)t" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(15\)zn Search vendor "Cisco" for product "Ios" and version "12.2\(15\)zn" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(15.1\)s Search vendor "Cisco" for product "Ios" and version "12.2\(15.1\)s" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(16\)b Search vendor "Cisco" for product "Ios" and version "12.2\(16\)b" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 12.2\(16.1\)b Search vendor "Cisco" for product "Ios" and version "12.2\(16.1\)b" | - |
Affected
|