{"api_version":"1","generated_at":"2026-04-23T15:18:00+00:00","cve":"CVE-2000-0268","urls":{"html":"https://cve.report/CVE-2000-0268","api":"https://cve.report/api/cve/CVE-2000-0268.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2000-0268","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2000-0268"},"summary":{"title":"CVE-2000-0268","description":"Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.","state":"PUBLISHED","assigner":"mitre","published_at":"2000-04-20 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.osvdb.org/1289","name":"http://www.osvdb.org/1289","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.securityfocus.com/bid/1123","name":"http://www.securityfocus.com/bid/1123","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Cisco IOS Software TELNET Option Handling Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml","name":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Cisco IOS Software TELNET Option Handling Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2000-0268","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2000-0268","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"3660_router","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"7100_router","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"7200_router","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"7500_router","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"accesspath","cpe6":"ls-3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"accesspath","cpe6":"ts-3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"accesspath","cpe6":"vs-3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"as5200","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"as5300","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"as5800","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"11.3aa","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(2\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(2\\)xc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(2\\)xd","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(2\\)xf","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(2\\)xg","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(3\\)t2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(4\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(4\\)s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(4\\)t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(5\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(6\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"12.0\\(7\\)t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"system_controller_3640","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"ubr7200","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2000","cve_id":"268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"voice_gateway_as5800","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T05:14:20.398Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1123","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/1123"},{"name":"1289","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/1289"},{"name":"20000420 Cisco IOS Software TELNET Option Handling Vulnerability","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2000-04-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2004-09-02T09:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1123","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/1123"},{"name":"1289","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/1289"},{"name":"20000420 Cisco IOS Software TELNET Option Handling Vulnerability","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2000-0268","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1123","refsource":"BID","url":"http://www.securityfocus.com/bid/1123"},{"name":"1289","refsource":"OSVDB","url":"http://www.osvdb.org/1289"},{"name":"20000420 Cisco IOS Software TELNET Option Handling Vulnerability","refsource":"CISCO","url":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2000-0268","datePublished":"2000-06-02T04:00:00.000Z","dateReserved":"2000-04-26T00:00:00.000Z","dateUpdated":"2024-08-08T05:14:20.398Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2000-04-20 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*","matchCriteriaId":"D8783C0A-990A-4B79-8BF9-64E425DA585E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"77DDC99D-8B73-452C-94A7-A9A48F2F379B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","matchCriteriaId":"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","matchCriteriaId":"C48466C4-5A1E-4C71-8822-32D387B36B8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*","matchCriteriaId":"08E23131-D207-4D98-96D5-2B71FF792604"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*","matchCriteriaId":"1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*","matchCriteriaId":"E7109585-1433-4940-B7C9-C561DEAF1498"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*","matchCriteriaId":"1A0D82E1-CCF7-429B-A637-479E839EAE3C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*","matchCriteriaId":"E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*","matchCriteriaId":"4F1B2747-4A9C-44FC-BBA8-39E338B30417"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*","matchCriteriaId":"D5BB7513-C232-4B4F-BE68-972B05086ABD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*","matchCriteriaId":"ECCE69A3-41C6-4893-86D4-7F264352C8A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*","matchCriteriaId":"FA654CE6-82C3-43D0-BAED-70E88A740BF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:accesspath:ls-3:*:*:*:*:*:*:*","matchCriteriaId":"7D8CD3D5-C52F-4B38-8DA7-5441B7CD000D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:accesspath:ts-3:*:*:*:*:*:*:*","matchCriteriaId":"1DD96A21-1862-4E35-BD02-2928DD44B3C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:accesspath:vs-3:*:*:*:*:*:*:*","matchCriteriaId":"D537F5F7-8227-46CC-A30F-B81C25AD9FA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:as5200:*:*:*:*:*:*:*:*","matchCriteriaId":"6E74902A-1785-40FE-92A0-55BD27D6FEC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:as5300:*:*:*:*:*:*:*:*","matchCriteriaId":"883975E5-FE8B-4DC4-8F71-E68791ABD17D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:as5800:*:*:*:*:*:*:*:*","matchCriteriaId":"823E4E18-8719-4167-83BE-CF2DA55558E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:system_controller_3640:*:*:*:*:*:*:*:*","matchCriteriaId":"B7C0CC3E-3E01-4607-BE75-4A6A1074DC82"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:voice_gateway_as5800:*:*:*:*:*:*:*:*","matchCriteriaId":"9D185F2F-788C-44F1-A635-90E33A4A88B9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:3660_router:*:*:*:*:*:*:*:*","matchCriteriaId":"5EAE468C-7D0F-4F6D-B598-B2E422EFDCD5"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:7100_router:*:*:*:*:*:*:*:*","matchCriteriaId":"C3715102-E348-457A-9546-94BBCEF91A00"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*","matchCriteriaId":"60DEA083-B9BC-42DB-A4F7-986A5A185DE6"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:7500_router:*:*:*:*:*:*:*:*","matchCriteriaId":"FCFAA111-F831-4BC9-BCD7-246ED6C0F3FF"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:ubr7200:*:*:*:*:*:*:*:*","matchCriteriaId":"0B4917DF-B485-46A3-9515-8BDDD1F13C77"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2000","CveId":"268","Ordinal":"1","Title":"CVE-2000-0268","CVE":"CVE-2000-0268","Year":"2000"},"notes":[{"CveYear":"2000","CveId":"268","Ordinal":"1","NoteData":"Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.","Type":"Description","Title":"CVE-2000-0268"},{"CveYear":"2000","CveId":"268","Ordinal":"2","NoteData":"2000-06-02","Type":"Other","Title":"Published"},{"CveYear":"2000","CveId":"268","Ordinal":"3","NoteData":"2004-09-02","Type":"Other","Title":"Modified"}]}}}