{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:55:23.585","vulnerabilities":[{"cve":{"id":"CVE-2008-3813","sourceIdentifier":"psirt@cisco.com","published":"2008-09-26T16:21:44.363","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when the L2TP mgmt daemon process is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted L2TP packet."},{"lang":"es","value":"Vulnerabilidad no especificada en Cisco IOS v12.2 y v12.4. Cuando está habilitado el proceso de demonio del L2TP (Layer 2 Tunneling Protocol) mgmt permite a atacantes remotos causar denegación de servicio (reinicio de dispositivo) a través un paquete L2TP manipulado."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*","matchCriteriaId":"F05A548B-C443-4C15-B636-64C1F9B9860D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*","matchCriteriaId":"E85ABE5E-7900-4A9C-A945-48B293EF46B5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*","matchCriteriaId":"D8E6BB50-7C0C-4E31-8DB0-40E145C8D9CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*","matchCriteriaId":"C7414D32-88A1-416E-A717-3F47B6D1BE74"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*","matchCriteriaId":"370DC543-AC01-4B91-88C7-60C323E35929"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*","matchCriteriaId":"BEAD7398-D1B2-47FB-952D-8C3162D5A363"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*","matchCriteriaId":"BF610051-1638-4C1B-9864-11E34EFC4DE6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*","matchCriteriaId":"883FA166-2973-42BA-842D-28FBDBFEAC4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*","matchCriteriaId":"4362045B-7065-4FF9-A977-B3DA7894F831"}]}]}],"references":[{"url":"http://secunia.com/advisories/31990","source":"psirt@cisco.com","tags":["Third Party Advisory"]},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml","source":"psirt@cisco.com","tags":["Third Party Advisory"]},{"url":"http://www.securitytracker.com/id?1020938","source":"psirt@cisco.com","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.vupen.com/english/advisories/2008/2670","source":"psirt@cisco.com","tags":["Permissions Required"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5362","source":"psirt@cisco.com","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/31990","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0157a.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.securitytracker.com/id?1020938","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.vupen.com/english/advisories/2008/2670","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5362","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}