Loading...
Loading...
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2012-3509 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3509 CVE-2014-8484 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484 CVE-2014-8485 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485 CVE-2014-8501 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501 CVE-2014-8502 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502 CVE-2014-8503 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503 CVE-2014-8504 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504 CVE-2014-8737 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737 CVE-2014-8738 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738 CVE-2014-9939 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939 CVE-2017-12448 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12448 CVE-2017-12449 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12449 CVE-2017-12450 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12450 CVE-2017-12451 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451 CVE-2017-12452 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452 CVE-2017-12453 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453 CVE-2017-12454 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454 CVE-2017-12455 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455 CVE-2017-12456 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456 CVE-2017-12457 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12457 CVE-2017-12458 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12458 CVE-2017-12459 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12459 CVE-2018-1000876 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876 CVE-2018-19931 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931 CVE-2018-19932 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932 CVE-2018-20671 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671 CVE-2019-1010204 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 CVE-2020-19724 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724 CVE-2020-21490 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490 CVE-2020-35342 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342 CVE-2020-35493 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493 CVE-2020-35494 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494 CVE-2020-35495 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495 CVE-2020-35496 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496 CVE-2020-35507 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507 CVE-2021-20197 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197 CVE-2021-37322 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37322 CVE-2021-45078 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 CVE-2021-46174 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174 CVE-2022-38533 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533 CVE-2022-44840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840 CVE-2022-45703 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703 CVE-2022-47673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673 CVE-2022-47695 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695 CVE-2022-47696 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696 CVE-2022-48063 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063 CVE-2022-48064 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064 CVE-2022-48065 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065 CVE-2023-25584 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584 CVE-2025-0840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840 After analysis, Cisco has decided against performing additional actions on this product due to one of the following reasons: - The product is no longer maintained, having reached End of Software Maintenance. - The product is still being maintained, but a business decision was made not to upgrade the vulnerable product. - The product uses the affected third-party component in such a way as to not be affected by these vulnerabilities.
Device with default configuration.
Not available or not applicable.
Additional details about the vulnerabilities listed above can be found at https://www.cve.org/. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 3.0 score. The Base CVSS score as of the time of evaluation is: 9.8 https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE ID CVE-2012-3509, CVE-2014-8484, CVE-2014-8485, CVE-2014-8501, CVE-2014-8502, CVE-2014-8503, CVE-2014-8504, CVE-2014-8737, CVE-2014-8738, CVE-2014-9939, CVE-2017-12448, CVE-2017-12449, CVE-2017-12450, CVE-2017-12451, CVE-2017-12452, CVE-2017-12453, CVE-2017-12454, CVE-2017-12455, CVE-2017-12456, CVE-2017-12457, CVE-2017-12458, CVE-2017-12459, CVE-2018-1000876, CVE-2018-19931, CVE-2018-19932, CVE-2018-20671, CVE-2019-1010204, CVE-2020-19724, CVE-2020-21490, CVE-2020-35342, CVE-2020-35493, CVE-2020-35494, CVE-2020-35495, CVE-2020-35496, CVE-2020-35507, CVE-2021-20197, CVE-2021-37322, CVE-2021-45078, CVE-2021-46174, CVE-2022-38533, CVE-2022-44840, CVE-2022-45703, CVE-2022-47673, CVE-2022-47695, CVE-2022-47696, CVE-2022-48063, CVE-2022-48064, CVE-2022-48065, CVE-2023-25584, CVE-2025-0840 have been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Click on a version to see all relevant bugs
Cisco Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.