7.8
CWE
Advisory Published
Updated

CVE-2010-0586

First published: Thu Mar 25 2010(Updated: )

Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz49741, the "SCCP Request Handling Denial of Service Vulnerability."

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Puppet Cisco IOS=12.3ym
Puppet Cisco IOS=12.3yq
Puppet Cisco IOS=12.3xr
Puppet Cisco IOS=12.4t
Puppet Cisco IOS=12.1yd
Puppet Cisco IOS=12.3xg
Puppet Cisco IOS=12.4xj
Puppet Cisco IOS=12.2zp
Puppet Cisco IOS=12.3xd
Puppet Cisco IOS=12.4xl
Puppet Cisco IOS=12.4xm
Puppet Cisco IOS=12.3xw
Puppet Cisco IOS=12.4mr
Puppet Cisco IOS=12.2xg
Puppet Cisco IOS=12.2b
Puppet Cisco IOS=12.4xt
Puppet Cisco IOS=12.3xi
Puppet Cisco IOS=12.2yn
Puppet Cisco IOS=12.4gc
Puppet Cisco IOS=12.2xb
Puppet Cisco IOS=12.2ym
Puppet Cisco IOS=12.2yw
Puppet Cisco IOS=12.3yu
Puppet Cisco IOS=12.2yd
Puppet Cisco IOS=12.3xj
Puppet Cisco IOS=12.3t
Puppet Cisco IOS=12.2yb
Puppet Cisco IOS=12.3
Puppet Cisco IOS=12.2zh
Puppet Cisco IOS=12.2yv
Puppet Cisco IOS=12.2xw
Puppet Cisco IOS=12.2t
Puppet Cisco IOS=12.2zc
Puppet Cisco IOS=12.3xz
Puppet Cisco IOS=12.2yt
Puppet Cisco IOS=12.4xg
Puppet Cisco IOS=12.4ya
Puppet Cisco IOS=12.2yl
Puppet Cisco IOS=12.4xv
Puppet Cisco IOS=12.4xw
Puppet Cisco IOS=12.2zb
Puppet Cisco IOS=12.2xu
Puppet Cisco IOS=12.4xz
Puppet Cisco IOS=12.1yi
Puppet Cisco IOS=12.3xf
Puppet Cisco IOS=12.3xl
Puppet Cisco IOS=12.3yk
Puppet Cisco IOS=12.3yf
Puppet Cisco IOS=12.4xd
Puppet Cisco IOS=12.4xp
Puppet Cisco IOS=12.2xm
Puppet Cisco IOS=12.3yt
Puppet Cisco IOS=12.3xb
Puppet Cisco IOS=12.2zj
Puppet Cisco IOS=12.3yz
Puppet Cisco IOS=12.3yg
Puppet Cisco IOS=12.3xu
Puppet Cisco IOS=12.2zd
Puppet Cisco IOS=12.3xy
Puppet Cisco IOS=12.3xc
Puppet Cisco IOS=12.4
Puppet Cisco IOS=12.2tpc
Puppet Cisco IOS=12.3xe
Puppet Cisco IOS=12.2yc
Puppet Cisco IOS=12.2ze
Puppet Cisco IOS=12.3tpc
Puppet Cisco IOS=12.4xa
Puppet Cisco IOS=12.2yy
Puppet Cisco IOS=12.3za
Puppet Cisco IOS=12.2yu
Puppet Cisco IOS=12.4xe
Puppet Cisco IOS=12.3yx
Puppet Cisco IOS=12.2bx
Puppet Cisco IOS=12.3xq
Puppet Cisco IOS=12.2zl
Puppet Cisco IOS=12.3ys
Puppet Cisco IOS=12.3jk
Puppet Cisco IOS=12.2zf
Puppet Cisco IOS=12.3b
Puppet Cisco IOS=12.4yb
Puppet Cisco IOS=12.2ya
Puppet Cisco IOS=12.4xb
Puppet Cisco IOS=12.3xx
Puppet Cisco IOS=12.4xy
Puppet Cisco IOS=12.4xc
Puppet Cisco IOS=12.3xa
Puppet Cisco IOS=12.1ye
Puppet Cisco IOS=12.3xk
Puppet Cisco IOS=12.2yj
Puppet Cisco IOS=12.2mc
Puppet Cisco IOS=12.2by
Puppet Cisco IOS=12.2yh
Puppet Cisco IOS=12.2xt

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2010-0586?

    CVE-2010-0586 has a severity rating classified as high, primarily due to its potential to cause a denial of service.

  • What versions of Cisco IOS are affected by CVE-2010-0586?

    CVE-2010-0586 affects Cisco IOS versions 12.1 through 12.4, particularly when CME or SRST is enabled.

  • How do I fix CVE-2010-0586?

    To fix CVE-2010-0586, it is recommended to upgrade to a Cisco IOS version that is not affected, as per Cisco's security advisory.

  • What is the impact of CVE-2010-0586 on Cisco devices?

    The impact of CVE-2010-0586 allows remote attackers to send malformed SCCP messages that can trigger a device reload, resulting in denial of service.

  • Does CVE-2010-0586 require authentication to exploit?

    CVE-2010-0586 can be exploited remotely without authentication, making it a significant security risk.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203