CWE
287
Advisory Published
CVE Published
Updated

CVE-2001-0537

First published: Sat Jul 21 2001(Updated: )

HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Puppet Cisco IOS=11.3
Puppet Cisco IOS=11.3aa
Puppet Cisco IOS=11.3da
Puppet Cisco IOS=11.3db
Puppet Cisco IOS=11.3ha
Puppet Cisco IOS=11.3ma
Puppet Cisco IOS=11.3na
Puppet Cisco IOS=11.3t
Puppet Cisco IOS=11.3xa
Puppet Cisco IOS=12.0
Puppet Cisco IOS=12.0\(5\)xk
Puppet Cisco IOS=12.0\(7\)xk
Puppet Cisco IOS=12.0\(10\)w5\(18g\)
Puppet Cisco IOS=12.0\(14\)w5\(20\)
Puppet Cisco IOS=12.0da
Puppet Cisco IOS=12.0db
Puppet Cisco IOS=12.0dc
Puppet Cisco IOS=12.0s
Puppet Cisco IOS=12.0sc
Puppet Cisco IOS=12.0sl
Puppet Cisco IOS=12.0st
Puppet Cisco IOS=12.0t
Puppet Cisco IOS=12.0wc
Puppet Cisco IOS=12.0wt
Puppet Cisco IOS=12.0xa
Puppet Cisco IOS=12.0xb
Puppet Cisco IOS=12.0xc
Puppet Cisco IOS=12.0xd
Puppet Cisco IOS=12.0xe
Puppet Cisco IOS=12.0xf
Puppet Cisco IOS=12.0xg
Puppet Cisco IOS=12.0xh
Puppet Cisco IOS=12.0xi
Puppet Cisco IOS=12.0xj
Puppet Cisco IOS=12.0xl
Puppet Cisco IOS=12.0xm
Puppet Cisco IOS=12.0xn
Puppet Cisco IOS=12.0xp
Puppet Cisco IOS=12.0xq
Puppet Cisco IOS=12.0xr
Puppet Cisco IOS=12.0xs
Puppet Cisco IOS=12.0xu
Puppet Cisco IOS=12.0xv
Puppet Cisco IOS=12.1
Puppet Cisco IOS=12.1aa
Puppet Cisco IOS=12.1cx
Puppet Cisco IOS=12.1da
Puppet Cisco IOS=12.1db
Puppet Cisco IOS=12.1dc
Puppet Cisco IOS=12.1e
Puppet Cisco IOS=12.1ec
Puppet Cisco IOS=12.1ex
Puppet Cisco IOS=12.1ey
Puppet Cisco IOS=12.1ez
Puppet Cisco IOS=12.1t
Puppet Cisco IOS=12.1xa
Puppet Cisco IOS=12.1xb
Puppet Cisco IOS=12.1xc
Puppet Cisco IOS=12.1xd
Puppet Cisco IOS=12.1xe
Puppet Cisco IOS=12.1xf
Puppet Cisco IOS=12.1xg
Puppet Cisco IOS=12.1xh
Puppet Cisco IOS=12.1xi
Puppet Cisco IOS=12.1xj
Puppet Cisco IOS=12.1xk
Puppet Cisco IOS=12.1xl
Puppet Cisco IOS=12.1xm
Puppet Cisco IOS=12.1xp
Puppet Cisco IOS=12.1xq
Puppet Cisco IOS=12.1xr
Puppet Cisco IOS=12.1xs
Puppet Cisco IOS=12.1xt
Puppet Cisco IOS=12.1xu
Puppet Cisco IOS=12.1xv
Puppet Cisco IOS=12.1xw
Puppet Cisco IOS=12.1xx
Puppet Cisco IOS=12.1xy
Puppet Cisco IOS=12.1xz
Puppet Cisco IOS=12.1ya
Puppet Cisco IOS=12.1yb
Puppet Cisco IOS=12.1yc
Puppet Cisco IOS=12.1yd
Puppet Cisco IOS=12.1yf
Puppet Cisco IOS=12.2
Puppet Cisco IOS=12.2t
Puppet Cisco IOS=12.2xa
Puppet Cisco IOS=12.2xd
Puppet Cisco IOS=12.2xe
Puppet Cisco IOS=12.2xh
Puppet Cisco IOS=12.2xq

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2001-0537?

    CVE-2001-0537 has been classified with a high severity level due to its potential to allow unauthorized command execution.

  • How do I fix CVE-2001-0537?

    To fix CVE-2001-0537, it's recommended to update Cisco IOS to a version that addresses this vulnerability.

  • What types of software are affected by CVE-2001-0537?

    CVE-2001-0537 affects various versions of Cisco IOS ranging from 11.3 to 12.2.

  • What can attackers achieve using CVE-2001-0537?

    Attackers exploiting CVE-2001-0537 can bypass authentication and execute arbitrary commands on the affected Cisco devices.

  • Is CVE-2001-0537 still a risk for current systems?

    Due to the age of the vulnerability, it is not widely considered a risk for modern systems, but systems running the affected versions should still be audited.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203