Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0380: The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attac

0
High
VulnerabilityCVE-2000-0380cve-2000-0380denial of servicecwe-20
Published: Wed Apr 26 2000 (04/26/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:34:23 UTC

Technical Analysis

CVE-2000-0380 is a high-severity vulnerability affecting Cisco IOS HTTP services on routers and switches running IOS versions 11.1 through 12.1. The flaw arises from improper input validation in the HTTP service, where a remote attacker can send a specially crafted URL containing the sequence '%%'. This malformed input triggers a denial of service (DoS) condition, causing the affected device to crash or become unresponsive. The vulnerability does not require authentication, and exploitation can be performed remotely over the network, making it accessible to any attacker with network access to the device's HTTP management interface. The impact is limited to availability, with no direct compromise of confidentiality or integrity reported. The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the root cause is insufficient sanitization of user-supplied input. Despite the age of this vulnerability (published in April 2000), many legacy Cisco devices in operational environments may still run these affected IOS versions, especially in industrial, infrastructure, or less frequently updated network segments. No patches are available for this vulnerability, and no known exploits have been reported in the wild, but the ease of triggering the DoS condition and the critical role of these devices in network infrastructure make it a significant risk. The CVSS v2 score is 7.1 (high), reflecting network attack vector, medium attack complexity, no authentication required, and impact limited to availability disruption.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network availability. Cisco routers and switches are widely deployed across enterprise, government, and critical infrastructure networks in Europe. A successful DoS attack could disrupt internal and external communications, impacting business operations, service delivery, and potentially critical infrastructure such as energy grids, transportation networks, and telecommunications. Given that the vulnerability affects HTTP management interfaces, attackers could target exposed management networks or improperly segmented devices. The lack of authentication requirement lowers the barrier for exploitation, increasing risk especially in environments where network segmentation or firewall rules are insufficient. While confidentiality and integrity are not directly impacted, the availability disruption could have cascading effects on dependent systems and services. European organizations with legacy network equipment running these IOS versions are particularly vulnerable, especially in sectors with slower upgrade cycles or stringent operational constraints. The absence of patches necessitates alternative mitigation strategies to reduce exposure.

Mitigation Recommendations

1. Disable the HTTP service on Cisco IOS devices if it is not strictly necessary for management purposes. 2. Restrict access to the HTTP management interface using access control lists (ACLs) to allow only trusted management hosts or networks. 3. Implement network segmentation to isolate management interfaces from general user or internet-facing networks, reducing exposure to remote attackers. 4. Use secure management protocols such as SSH or HTTPS (if supported and patched) instead of HTTP for device management. 5. Monitor network traffic for unusual HTTP requests containing suspicious patterns like '%%' and implement intrusion detection/prevention rules to block such malformed requests. 6. Plan and execute an upgrade strategy to move affected devices to newer, supported IOS versions that do not contain this vulnerability. 7. Employ redundancy and failover mechanisms in network design to minimize impact in case of device unavailability due to DoS. 8. Regularly audit device configurations and firmware versions to identify and remediate legacy systems still running vulnerable IOS versions.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7dfa43

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 7:34:23 PM

Last updated: 2/7/2026, 6:36:06 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats