Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-1100


The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.


Security Impact Summary

CVE-2013-1100 is a security vulnerability that . Impacting 85 products from cisco, from cisco, from cisco and 82 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Documented in 2013, this vulnerability occurred amid the cloud computing expansion era, where traditional network perimeter security models were being reevaluated. Organizations were transitioning from isolated infrastructure to interconnected systems, creating new attack surfaces that vulnerabilities like this could exploit.


Published

2013-02-13T23:55:01.117

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.4 (MEDIUM)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

4.9

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-399

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios - Yes
Hardware cisco catalyst_2820 * No
Hardware cisco catalyst_2820 9.0_0.07 No
Hardware cisco catalyst_2900 * No
Hardware cisco catalyst_2900 lre_xl No
Hardware cisco catalyst_2900 xl No
Hardware cisco catalyst_2900_vlan * No
Hardware cisco catalyst_2900xl * No
Hardware cisco catalyst_2901 * No
Hardware cisco catalyst_2902 * No
Hardware cisco catalyst_2920 * No
Hardware cisco catalyst_2926 * No
Hardware cisco catalyst_2926f * No
Hardware cisco catalyst_2926gl * No
Hardware cisco catalyst_2926gs * No
Hardware cisco catalyst_2926t * No
Hardware cisco catalyst_2940 * No
Hardware cisco catalyst_2948 * No
Hardware cisco catalyst_2948-ge-tx * No
Hardware cisco catalyst_2948g * No
Hardware cisco catalyst_2948g-l3 * No
Hardware cisco catalyst_2950 * No
Hardware cisco catalyst_2950_lre * No
Hardware cisco catalyst_2955 * No
Hardware cisco catalyst_2970 * No
Hardware cisco catalyst_2980g * No
Hardware cisco catalyst_2980g-a * No
Hardware cisco catalyst_3000 * No
Hardware cisco catalyst_3200 * No
Hardware cisco catalyst_3500 * No
Hardware cisco catalyst_3500_xl * No
Hardware cisco catalyst_3500xl * No
Hardware cisco catalyst_3550 * No
Hardware cisco catalyst_3560 * No
Hardware cisco catalyst_3560-e * No
Hardware cisco catalyst_3560-x * No
Hardware cisco catalyst_3750 * No
Hardware cisco catalyst_3750-e * No
Hardware cisco catalyst_3750-x * No
Hardware cisco catalyst_3750_metro * No
Hardware cisco catalyst_3750g * No
Hardware cisco catalyst_3900 * No
Hardware cisco catalyst_4000 * No
Hardware cisco catalyst_4200 * No
Hardware cisco catalyst_4224 * No
Hardware cisco catalyst_4232 * No
Hardware cisco catalyst_4232-13 * No
Hardware cisco catalyst_4500 * No
Hardware cisco catalyst_4503 * No
Hardware cisco catalyst_4506 * No
Hardware cisco catalyst_4507r * No
Hardware cisco catalyst_4510r * No
Hardware cisco catalyst_4840g * No
Hardware cisco catalyst_4908g-l3 * No
Hardware cisco catalyst_4912g * No
Hardware cisco catalyst_4948 * No
Hardware cisco catalyst_5000 * No
Hardware cisco catalyst_5500 * No
Hardware cisco catalyst_5505 * No
Hardware cisco catalyst_5509 * No
Hardware cisco catalyst_6000 * No
Hardware cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\) No
Hardware cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\) No
Hardware cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\) No
Hardware cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\) No
Hardware cisco catalyst_6000_ws-x6380-nam 2.1\(2\) No
Hardware cisco catalyst_6000_ws-x6380-nam 3.1\(1a\) No
Hardware cisco catalyst_6500 * No
Hardware cisco catalyst_6500_ws-svc-nam-1 2.2\(1a\) No
Hardware cisco catalyst_6500_ws-svc-nam-1 3.1\(1a\) No
Hardware cisco catalyst_6500_ws-svc-nam-2 2.2\(1a\) No
Hardware cisco catalyst_6500_ws-svc-nam-2 3.1\(1a\) No
Hardware cisco catalyst_6500_ws-x6380-nam 2.1\(2\) No
Hardware cisco catalyst_6500_ws-x6380-nam 3.1\(1a\) No
Hardware cisco catalyst_6503-e - No
Hardware cisco catalyst_6504-e - No
Hardware cisco catalyst_6506-e - No
Hardware cisco catalyst_6509-e - No
Hardware cisco catalyst_6509-neb-a - No
Hardware cisco catalyst_6509-v-e - No
Hardware cisco catalyst_6513 - No
Hardware cisco catalyst_6513-e - No
Hardware cisco catalyst_6608 * No
Hardware cisco catalyst_6624 * No
Hardware cisco catalyst_7600 * No
Hardware cisco catalyst_7600_ws-svc-nam-1 2.2\(1a\) No
Hardware cisco catalyst_7600_ws-svc-nam-1 3.1\(1a\) No
Hardware cisco catalyst_7600_ws-svc-nam-2 2.2\(1a\) No
Hardware cisco catalyst_7600_ws-svc-nam-2 3.1\(1a\) No
Hardware cisco catalyst_7600_ws-x6380-nam 2.1\(2\) No
Hardware cisco catalyst_7600_ws-x6380-nam 3.1\(1a\) No
Hardware cisco catalyst_8500 * No
Hardware cisco catalyst_8510csr * No
Hardware cisco catalyst_8510msr * No
Hardware cisco catalyst_8540csr * No
Hardware cisco catalyst_8540msr * No
Hardware cisco catalyst_ws-c2924-xl * No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For cisco's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.