{"api_version":"1","generated_at":"2026-04-23T11:32:31+00:00","cve":"CVE-2008-0537","urls":{"html":"https://cve.report/CVE-2008-0537","api":"https://cve.report/api/cve/CVE-2008-0537.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-0537","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-0537"},"summary":{"title":"CVE-2008-0537","description":"Unspecified vulnerability in the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720), and Route Switch Processor 720 (RSP720) for multiple Cisco products, when using Multi Protocol Label Switching (MPLS) VPN and OSPF sham-link, allows remote attackers to cause a denial of service (blocked queue, device restart, or memory leak) via unknown vectors.","state":"PUBLISHED","assigner":"cisco","published_at":"2008-03-27 10:44:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.1","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:N/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.securitytracker.com/id?1019716","name":"http://www.securitytracker.com/id?1019716","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Cisco IOS OSPF/MPLS VPN Bug Lets Remote Users Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28463","name":"http://www.securityfocus.com/bid/28463","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Cisco IOS With OSPF, MPLS VPN, Sup32, Sup720 or RSP720  Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2008/1005/references","name":"http://www.vupen.com/english/advisories/2008/1005/references","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.us-cert.gov/cas/techalerts/TA08-087B.html","name":"http://www.us-cert.gov/cas/techalerts/TA08-087B.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"US-CERT Technical Cyber Security Alert TA08-087B -- Cisco Updates for Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41466","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41466","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29559","name":"http://secunia.com/advisories/29559","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Cisco IOS Denial of Service Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml","name":"http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Cisco - Networking, Cloud, and Cybersecurity Solutions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-0537","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-0537","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"537","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"7600_router","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"537","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"catalyst_6500","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"537","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"cisco","cpe5":"me_6524_ethernet_switch","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"537","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"route_switch_processor","cpe6":"rsp720","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"537","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"supervisor_engine","cpe6":"sup32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"537","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"supervisor_engine","cpe6":"sup720","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T07:46:55.045Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"cisco-catalyst-sup-rsp-dos(41466)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41466"},{"name":"29559","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29559"},{"name":"TA08-087B","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-087B.html"},{"name":"ADV-2008-1005","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1005/references"},{"name":"20080326 Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Route Switch Processor 720","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml"},{"name":"1019716","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1019716"},{"name":"28463","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/28463"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-03-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"Unspecified vulnerability in the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720), and Route Switch Processor 720 (RSP720) for multiple Cisco products, when using Multi Protocol Label Switching (MPLS) VPN and OSPF sham-link, allows remote attackers to cause a denial of service (blocked queue, device restart, or memory leak) via unknown vectors."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-07T12:57:01.000Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"cisco-catalyst-sup-rsp-dos(41466)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41466"},{"name":"29559","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29559"},{"name":"TA08-087B","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-087B.html"},{"name":"ADV-2008-1005","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1005/references"},{"name":"20080326 Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Route Switch Processor 720","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml"},{"name":"1019716","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1019716"},{"name":"28463","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/28463"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","ID":"CVE-2008-0537","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Unspecified vulnerability in the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720), and Route Switch Processor 720 (RSP720) for multiple Cisco products, when using Multi Protocol Label Switching (MPLS) VPN and OSPF sham-link, allows remote attackers to cause a denial of service (blocked queue, device restart, or memory leak) via unknown vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"cisco-catalyst-sup-rsp-dos(41466)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41466"},{"name":"29559","refsource":"SECUNIA","url":"http://secunia.com/advisories/29559"},{"name":"TA08-087B","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA08-087B.html"},{"name":"ADV-2008-1005","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1005/references"},{"name":"20080326 Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Route Switch Processor 720","refsource":"CISCO","url":"http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml"},{"name":"1019716","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1019716"},{"name":"28463","refsource":"BID","url":"http://www.securityfocus.com/bid/28463"}]}}}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2008-0537","datePublished":"2008-03-27T10:00:00.000Z","dateReserved":"2008-01-31T00:00:00.000Z","dateUpdated":"2024-08-07T07:46:55.045Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-03-27 10:44:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7600_router:*:*:*:*:*:*:*:*","matchCriteriaId":"9097F459-1AE3-4924-8E81-046F84FBB041"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*","matchCriteriaId":"99DE48DF-A309-4A1C-B977-AE81B4EDB589"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:me_6524_ethernet_switch:*:*:*:*:*:*:*:*","matchCriteriaId":"6188EAF7-F61F-44D9-8D8A-AED195D045F5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:route_switch_processor:rsp720:*:*:*:*:*:*:*","matchCriteriaId":"ABC994F2-CD1D-4B42-A92F-EF01BBBD59BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:supervisor_engine:sup32:*:*:*:*:*:*:*","matchCriteriaId":"99A3D8A9-FFD2-4DAC-997A-0E118878A360"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:supervisor_engine:sup720:*:*:*:*:*:*:*","matchCriteriaId":"D5ECF6D1-A7AB-4149-943E-F011038F6C40"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"537","Ordinal":"1","Title":"CVE-2008-0537","CVE":"CVE-2008-0537","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"537","Ordinal":"1","NoteData":"Unspecified vulnerability in the Supervisor Engine 32 (Sup32), Supervisor Engine 720 (Sup720), and Route Switch Processor 720 (RSP720) for multiple Cisco products, when using Multi Protocol Label Switching (MPLS) VPN and OSPF sham-link, allows remote attackers to cause a denial of service (blocked queue, device restart, or memory leak) via unknown vectors.","Type":"Description","Title":"CVE-2008-0537"},{"CveYear":"2008","CveId":"537","Ordinal":"2","NoteData":"2008-03-27","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"537","Ordinal":"3","NoteData":"2017-08-07","Type":"Other","Title":"Modified"}]}}}