IOIoT Support Risk
CVE

CVE-2001-0895

Multiple Cisco networking products allow remote attackers to cause a denial of service on the local network via a series of ARP packets sent to the router's interface that contains a different MAC address for the router, which eventually causes the router to overwrite the MAC address in its ARP table.

What this profile means

This public preview summarizes the normalized record without exposing paid citation paths. Use it to decide whether the device deserves a paid report, workspace review, or direct source verification.

Record typedevice
CategoryCVE
StatusNVD CVE record
Confidence90
CVECVE-2001-0895

Source coverage preview

Public pages show source names and record counts. Paid reports unlock source URLs, citation paths, and report-generation context.

Source rows checked2
Max source confidence90
Latest source observationMay 18, 2026
CitationsLocked in paid report
  • NIST NVD CVE API

Paid report value

  • Device/security signal snapshot
  • Known exploited and exploitability interpretation where available
  • Remediation and inventory-mapping checklist
  • Locked source citations and monitoring path

For records that need deeper review, use the main access flow to request source-backed report context, saved workspace review, or support before relying on the public preview.

Methodology and limits

Source-backed, but still worth verifying for high-impact use.

Security records are triage intelligence and should be validated against asset inventory, firmware versions, compensating controls, and vendor advisories.

For security teams

Prioritize known exploited and high-confidence records.

For buyers

Check support and vulnerability signals before purchase.

For MSPs

Use reports and monitors for customer device review.

Questions to ask before relying on this record

Paid reports include citation paths and report-generation context; public previews intentionally hide source URLs.

CVE-2001-0895 CVE Report | DataVerityHub