CVE-2021-1424 (GCVE-0-2021-1424)
Vulnerability from cvelistv5 – Published: 2024-11-18 15:35 – Updated: 2024-11-18 16:18
VLAI?
Summary
A vulnerability in the ipsecmgr process of Cisco ASR 5000 Series Software (StarOS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to insufficient validation of incoming Internet Key Exchange Version 2 (IKEv2) packets. An attacker could exploit this vulnerability by sending specifically malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause the ipsecmgr process to restart, which would disrupt ongoing IKE negotiations and result in a temporary DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Severity ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco ASR 5000 Series Software |
Affected:
21.15.7
Affected: 21.13.10 Affected: 21.14.1 Affected: 21.11.5 Affected: 21.13.8 Affected: 21.14.5 Affected: 21.12.8 Affected: 21.13.11 Affected: 21.11.8 Affected: 21.12.9 Affected: 21.15.5 Affected: 21.11.7 Affected: 21.13.5 Affected: 21.12.0 Affected: 21.15.2 Affected: 21.11.6 Affected: 21.14.2 Affected: 21.12.3 Affected: 21.15.0 Affected: 21.11.2 Affected: 21.13.7 Affected: 21.12.4 Affected: 21.12.12 Affected: 21.13.4 Affected: 21.12.5 Affected: 21.14.a0 Affected: 21.11.9 Affected: 21.14.0 Affected: 21.11.4 Affected: 21.12.7 Affected: 21.14.3 Affected: 21.12.2 Affected: 21.14.10 Affected: 21.15.4 Affected: 21.14.6 Affected: 21.15.3 Affected: 21.13.13 Affected: 21.12.11 Affected: 21.12.10 Affected: 21.14.9 Affected: 21.11.1 Affected: 21.14.7 Affected: 21.11.3 Affected: 21.13.3 Affected: 21.13.2 Affected: 21.13.14 Affected: 21.12.1 Affected: 21.13.6 Affected: 21.13.12 Affected: 21.15.8 Affected: 21.13.1 Affected: 21.15.1 Affected: 21.15.6 Affected: 21.13.9 Affected: 21.14.4 Affected: 21.13.0 Affected: 21.12.6 Affected: 21.14.8 Affected: 21.11.0 Affected: 21.15.15 Affected: 21.14.11 Affected: 21.17.2 Affected: 21.15.13 Affected: 21.15.12 Affected: 21.14.b15 Affected: 21.17.0 Affected: 21.15.10 Affected: 21.13.16 Affected: 21.14.12 Affected: 21.15.20 Affected: 21.11.10 Affected: 21.15.18 Affected: 21.15.14 Affected: 21.13.15 Affected: 21.15.21 Affected: 21.15.17 Affected: 21.17.1 Affected: 21.14.b14 Affected: 21.12.13 Affected: 21.12.14 Affected: 21.15.19 Affected: 21.15.11 Affected: 21.15.22 Affected: 21.17.3 Affected: 21.14.b13 Affected: 21.15.16 Affected: 21.14.b12 Affected: 21.16.2 Affected: 21.14.16 Affected: 21.14.b17 Affected: 21.15.24 Affected: 21.16.c9 Affected: 21.15.25 Affected: 21.15.26 Affected: 21.16.d0 Affected: 21.17.4 Affected: 21.15.27 Affected: 21.13.17 Affected: 21.18.0 Affected: 21.15.28 Affected: 21.14.17 Affected: 21.16.d1 Affected: 21.18.1 Affected: 21.16.3 Affected: 21.14.b18 Affected: 21.16.c10 Affected: 21.11.11 Affected: 21.15.29 Affected: 21.15.30 Affected: 21.13.18 Affected: 21.12.16 Affected: 21.17.5 Affected: 21.16.c11 Affected: 21.15.32 Affected: 21.13.19 Affected: 21.15.33 Affected: 21.11.12 Affected: 21.19.0 Affected: 21.18.2 Affected: 21.14.19 Affected: 21.19.1 Affected: 21.17.6 Affected: 21.11.13 Affected: 21.12.17 Affected: 21.15.36 Affected: 21.18.3 Affected: 21.14.b19 Affected: 21.19.2 Affected: 21.15.37 Affected: 21.17.7 Affected: 21.14.20 Affected: 21.16.c12 Affected: 21.18.4 Affected: 21.19.3 Affected: 21.13.20 Affected: 21.15.40 Affected: 21.14.b20 Affected: 21.16.4 Affected: 21.18.5 Affected: 21.14.b21 Affected: 21.16.c13 Affected: 21.11.14 Affected: 21.12.18 Affected: 21.20.SV1 Affected: 21.20.0 Affected: 21.15.41 Affected: 21.20.SV2 Affected: 21.17.8 Affected: 21.20.1 Affected: 21.20.SV3 Affected: 21.16.5 Affected: 21.20.SV5 Affected: 21.15.43 Affected: 21.19.4 Affected: 21.18.6 Affected: 21.15.45 Affected: 21.20.2 Affected: 21.16.c14 Affected: 21.17.9 Affected: 21.11.15 Affected: 21.14.22 Affected: 21.20.3 Affected: 21.15.46 Affected: 21.18.7 Affected: 21.19.n3 Affected: 21.15.47 Affected: 21.15.48 Affected: 21.19.5 Affected: 21.17.10 Affected: 21.18.8 Affected: 21.16.6 Affected: 21.12.19 Affected: 21.13.21 Affected: 21.20.4 Affected: 21.18.9 Affected: 21.19.n4 Affected: 21.17.11 Affected: 21.18.11 Affected: 21.19.6 Affected: 21.16.c15 Affected: 21.16.7 Affected: 21.17.12 Affected: 21.21.0 Affected: 21.17.13 Affected: 21.11.16 Affected: 21.12.20 Affected: 21.18.12 Affected: 21.12.21 Affected: 21.14.b22 Affected: 21.19.7 Affected: 21.20.6 Affected: 21.18.13 Affected: 21.19.n5 Affected: 21.18.14 Affected: 21.20.7 Affected: 21.11.17 Affected: 21.17.14 Affected: 21.19.8 Affected: 21.20.8 Affected: 21.19.9 Affected: 21.17.15 Affected: 21.20.9 Affected: 21.18.15 Affected: 21.15.51 Affected: 21.14.23 Affected: 21.19.10 Affected: 21.20.k6 Affected: 21.11.18 Affected: 21.19.n6 Affected: 21.16.8 Affected: 21.15.52 Affected: 21.17.16 Affected: 21.20.10 Affected: 21.15.53 Affected: 21.11.19 Affected: 21.20.k7 Affected: 21.15.54 Affected: 21.20.11 Affected: 21.20.u8 Affected: 21.21.1 Affected: 21.17.17 Affected: 21.15.55 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.a0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.20:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.21:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.19:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.22:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.24:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.25:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.26:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.d0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.27:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.28:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.d1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.29:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.30:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.32:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.19:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.33:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.19:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.36:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b19:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.37:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.20:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.20:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.40:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b20:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b21:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.41:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.43:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.45:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.22:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.46:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.47:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.48:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.19:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.13.21:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.20:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.12.21:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b22:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.18.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.51:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.14.23:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.k6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.16.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.52:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.53:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.11.19:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.k7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.54:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.20.u8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.17.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.15.55:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "asr_5000_series_software",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "21.15.7"
},
{
"status": "affected",
"version": "21.13.10"
},
{
"status": "affected",
"version": "21.14.1"
},
{
"status": "affected",
"version": "21.11.5"
},
{
"status": "affected",
"version": "21.13.8"
},
{
"status": "affected",
"version": "21.14.5"
},
{
"status": "affected",
"version": "21.12.8"
},
{
"status": "affected",
"version": "21.13.11"
},
{
"status": "affected",
"version": "21.11.8"
},
{
"status": "affected",
"version": "21.12.9"
},
{
"status": "affected",
"version": "21.15.5"
},
{
"status": "affected",
"version": "21.11.7"
},
{
"status": "affected",
"version": "21.13.5"
},
{
"status": "affected",
"version": "21.12.0"
},
{
"status": "affected",
"version": "21.15.2"
},
{
"status": "affected",
"version": "21.11.6"
},
{
"status": "affected",
"version": "21.14.2"
},
{
"status": "affected",
"version": "21.12.3"
},
{
"status": "affected",
"version": "21.15.0"
},
{
"status": "affected",
"version": "21.11.2"
},
{
"status": "affected",
"version": "21.13.7"
},
{
"status": "affected",
"version": "21.12.4"
},
{
"status": "affected",
"version": "21.12.12"
},
{
"status": "affected",
"version": "21.13.4"
},
{
"status": "affected",
"version": "21.12.5"
},
{
"status": "affected",
"version": "21.14.a0"
},
{
"status": "affected",
"version": "21.11.9"
},
{
"status": "affected",
"version": "21.14.0"
},
{
"status": "affected",
"version": "21.11.4"
},
{
"status": "affected",
"version": "21.12.7"
},
{
"status": "affected",
"version": "21.14.3"
},
{
"status": "affected",
"version": "21.12.2"
},
{
"status": "affected",
"version": "21.14.10"
},
{
"status": "affected",
"version": "21.15.4"
},
{
"status": "affected",
"version": "21.14.6"
},
{
"status": "affected",
"version": "21.15.3"
},
{
"status": "affected",
"version": "21.13.13"
},
{
"status": "affected",
"version": "21.12.11"
},
{
"status": "affected",
"version": "21.12.10"
},
{
"status": "affected",
"version": "21.14.9"
},
{
"status": "affected",
"version": "21.11.1"
},
{
"status": "affected",
"version": "21.14.7"
},
{
"status": "affected",
"version": "21.11.3"
},
{
"status": "affected",
"version": "21.13.3"
},
{
"status": "affected",
"version": "21.13.2"
},
{
"status": "affected",
"version": "21.13.14"
},
{
"status": "affected",
"version": "21.12.1"
},
{
"status": "affected",
"version": "21.13.6"
},
{
"status": "affected",
"version": "21.13.12"
},
{
"status": "affected",
"version": "21.15.8"
},
{
"status": "affected",
"version": "21.13.1"
},
{
"status": "affected",
"version": "21.15.1"
},
{
"status": "affected",
"version": "21.15.6"
},
{
"status": "affected",
"version": "21.13.9"
},
{
"status": "affected",
"version": "21.14.4"
},
{
"status": "affected",
"version": "21.13.0"
},
{
"status": "affected",
"version": "21.12.6"
},
{
"status": "affected",
"version": "21.14.8"
},
{
"status": "affected",
"version": "21.11.0"
},
{
"status": "affected",
"version": "21.15.15"
},
{
"status": "affected",
"version": "21.14.11"
},
{
"status": "affected",
"version": "21.17.2"
},
{
"status": "affected",
"version": "21.15.13"
},
{
"status": "affected",
"version": "21.15.12"
},
{
"status": "affected",
"version": "21.14.b15"
},
{
"status": "affected",
"version": "21.17.0"
},
{
"status": "affected",
"version": "21.15.10"
},
{
"status": "affected",
"version": "21.13.16"
},
{
"status": "affected",
"version": "21.14.12"
},
{
"status": "affected",
"version": "21.15.20"
},
{
"status": "affected",
"version": "21.11.10"
},
{
"status": "affected",
"version": "21.15.18"
},
{
"status": "affected",
"version": "21.15.14"
},
{
"status": "affected",
"version": "21.13.15"
},
{
"status": "affected",
"version": "21.15.21"
},
{
"status": "affected",
"version": "21.15.17"
},
{
"status": "affected",
"version": "21.17.1"
},
{
"status": "affected",
"version": "21.14.b14"
},
{
"status": "affected",
"version": "21.12.13"
},
{
"status": "affected",
"version": "21.12.14"
},
{
"status": "affected",
"version": "21.15.19"
},
{
"status": "affected",
"version": "21.15.11"
},
{
"status": "affected",
"version": "21.15.22"
},
{
"status": "affected",
"version": "21.17.3"
},
{
"status": "affected",
"version": "21.14.b13"
},
{
"status": "affected",
"version": "21.15.16"
},
{
"status": "affected",
"version": "21.14.b12"
},
{
"status": "affected",
"version": "21.16.2"
},
{
"status": "affected",
"version": "21.14.16"
},
{
"status": "affected",
"version": "21.14.b17"
},
{
"status": "affected",
"version": "21.15.24"
},
{
"status": "affected",
"version": "21.16.c9"
},
{
"status": "affected",
"version": "21.15.25"
},
{
"status": "affected",
"version": "21.15.26"
},
{
"status": "affected",
"version": "21.16.d0"
},
{
"status": "affected",
"version": "21.17.4"
},
{
"status": "affected",
"version": "21.15.27"
},
{
"status": "affected",
"version": "21.13.17"
},
{
"status": "affected",
"version": "21.18.0"
},
{
"status": "affected",
"version": "21.15.28"
},
{
"status": "affected",
"version": "21.14.17"
},
{
"status": "affected",
"version": "21.16.d1"
},
{
"status": "affected",
"version": "21.18.1"
},
{
"status": "affected",
"version": "21.16.3"
},
{
"status": "affected",
"version": "21.14.b18"
},
{
"status": "affected",
"version": "21.16.c10"
},
{
"status": "affected",
"version": "21.11.11"
},
{
"status": "affected",
"version": "21.15.29"
},
{
"status": "affected",
"version": "21.15.30"
},
{
"status": "affected",
"version": "21.13.18"
},
{
"status": "affected",
"version": "21.12.16"
},
{
"status": "affected",
"version": "21.17.5"
},
{
"status": "affected",
"version": "21.16.c11"
},
{
"status": "affected",
"version": "21.15.32"
},
{
"status": "affected",
"version": "21.13.19"
},
{
"status": "affected",
"version": "21.15.33"
},
{
"status": "affected",
"version": "21.11.12"
},
{
"status": "affected",
"version": "21.19.0"
},
{
"status": "affected",
"version": "21.18.2"
},
{
"status": "affected",
"version": "21.14.19"
},
{
"status": "affected",
"version": "21.19.1"
},
{
"status": "affected",
"version": "21.17.6"
},
{
"status": "affected",
"version": "21.11.13"
},
{
"status": "affected",
"version": "21.12.17"
},
{
"status": "affected",
"version": "21.15.36"
},
{
"status": "affected",
"version": "21.18.3"
},
{
"status": "affected",
"version": "21.14.b19"
},
{
"status": "affected",
"version": "21.19.2"
},
{
"status": "affected",
"version": "21.15.37"
},
{
"status": "affected",
"version": "21.17.7"
},
{
"status": "affected",
"version": "21.14.20"
},
{
"status": "affected",
"version": "21.16.c12"
},
{
"status": "affected",
"version": "21.18.4"
},
{
"status": "affected",
"version": "21.19.3"
},
{
"status": "affected",
"version": "21.13.20"
},
{
"status": "affected",
"version": "21.15.40"
},
{
"status": "affected",
"version": "21.14.b20"
},
{
"status": "affected",
"version": "21.16.4"
},
{
"status": "affected",
"version": "21.18.5"
},
{
"status": "affected",
"version": "21.14.b21"
},
{
"status": "affected",
"version": "21.16.c13"
},
{
"status": "affected",
"version": "21.11.14"
},
{
"status": "affected",
"version": "21.12.18"
},
{
"status": "affected",
"version": "21.20.sv1"
},
{
"status": "affected",
"version": "21.20.0"
},
{
"status": "affected",
"version": "21.15.41"
},
{
"status": "affected",
"version": "21.20.sv2"
},
{
"status": "affected",
"version": "21.17.8"
},
{
"status": "affected",
"version": "21.20.1"
},
{
"status": "affected",
"version": "21.20.sv3"
},
{
"status": "affected",
"version": "21.16.5"
},
{
"status": "affected",
"version": "21.20.sv5"
},
{
"status": "affected",
"version": "21.15.43"
},
{
"status": "affected",
"version": "21.19.4"
},
{
"status": "affected",
"version": "21.18.6"
},
{
"status": "affected",
"version": "21.15.45"
},
{
"status": "affected",
"version": "21.20.2"
},
{
"status": "affected",
"version": "21.16.c14"
},
{
"status": "affected",
"version": "21.17.9"
},
{
"status": "affected",
"version": "21.11.15"
},
{
"status": "affected",
"version": "21.14.22"
},
{
"status": "affected",
"version": "21.20.3"
},
{
"status": "affected",
"version": "21.15.46"
},
{
"status": "affected",
"version": "21.18.7"
},
{
"status": "affected",
"version": "21.19.n3"
},
{
"status": "affected",
"version": "21.15.47"
},
{
"status": "affected",
"version": "21.15.48"
},
{
"status": "affected",
"version": "21.19.5"
},
{
"status": "affected",
"version": "21.17.10"
},
{
"status": "affected",
"version": "21.18.8"
},
{
"status": "affected",
"version": "21.16.6"
},
{
"status": "affected",
"version": "21.12.19"
},
{
"status": "affected",
"version": "21.13.21"
},
{
"status": "affected",
"version": "21.20.4"
},
{
"status": "affected",
"version": "21.18.9"
},
{
"status": "affected",
"version": "21.19.n4"
},
{
"status": "affected",
"version": "21.17.11"
},
{
"status": "affected",
"version": "21.18.11"
},
{
"status": "affected",
"version": "21.19.6"
},
{
"status": "affected",
"version": "21.16.c15"
},
{
"status": "affected",
"version": "21.16.7"
},
{
"status": "affected",
"version": "21.17.12"
},
{
"status": "affected",
"version": "21.21.0"
},
{
"status": "affected",
"version": "21.17.13"
},
{
"status": "affected",
"version": "21.11.16"
},
{
"status": "affected",
"version": "21.12.20"
},
{
"status": "affected",
"version": "21.18.12"
},
{
"status": "affected",
"version": "21.12.21"
},
{
"status": "affected",
"version": "21.14.b22"
},
{
"status": "affected",
"version": "21.19.7"
},
{
"status": "affected",
"version": "21.20.6"
},
{
"status": "affected",
"version": "21.18.13"
},
{
"status": "affected",
"version": "21.19.n5"
},
{
"status": "affected",
"version": "21.18.14"
},
{
"status": "affected",
"version": "21.20.7"
},
{
"status": "affected",
"version": "21.11.17"
},
{
"status": "affected",
"version": "21.17.14"
},
{
"status": "affected",
"version": "21.19.8"
},
{
"status": "affected",
"version": "21.20.8"
},
{
"status": "affected",
"version": "21.19.9"
},
{
"status": "affected",
"version": "21.17.15"
},
{
"status": "affected",
"version": "21.20.9"
},
{
"status": "affected",
"version": "21.18.15"
},
{
"status": "affected",
"version": "21.15.51"
},
{
"status": "affected",
"version": "21.14.23"
},
{
"status": "affected",
"version": "21.19.10"
},
{
"status": "affected",
"version": "21.20.k6"
},
{
"status": "affected",
"version": "21.11.18"
},
{
"status": "affected",
"version": "21.19.n6"
},
{
"status": "affected",
"version": "21.16.8"
},
{
"status": "affected",
"version": "21.15.52"
},
{
"status": "affected",
"version": "21.17.16"
},
{
"status": "affected",
"version": "21.20.10"
},
{
"status": "affected",
"version": "21.15.53"
},
{
"status": "affected",
"version": "21.11.19"
},
{
"status": "affected",
"version": "21.20.k7"
},
{
"status": "affected",
"version": "21.15.54"
},
{
"status": "affected",
"version": "21.20.11"
},
{
"status": "affected",
"version": "21.20.u8"
},
{
"status": "affected",
"version": "21.21.1"
},
{
"status": "affected",
"version": "21.17.17"
},
{
"status": "affected",
"version": "21.15.55"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1424",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-18T15:57:49.747227Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T16:18:16.475Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco ASR 5000 Series Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "21.15.7"
},
{
"status": "affected",
"version": "21.13.10"
},
{
"status": "affected",
"version": "21.14.1"
},
{
"status": "affected",
"version": "21.11.5"
},
{
"status": "affected",
"version": "21.13.8"
},
{
"status": "affected",
"version": "21.14.5"
},
{
"status": "affected",
"version": "21.12.8"
},
{
"status": "affected",
"version": "21.13.11"
},
{
"status": "affected",
"version": "21.11.8"
},
{
"status": "affected",
"version": "21.12.9"
},
{
"status": "affected",
"version": "21.15.5"
},
{
"status": "affected",
"version": "21.11.7"
},
{
"status": "affected",
"version": "21.13.5"
},
{
"status": "affected",
"version": "21.12.0"
},
{
"status": "affected",
"version": "21.15.2"
},
{
"status": "affected",
"version": "21.11.6"
},
{
"status": "affected",
"version": "21.14.2"
},
{
"status": "affected",
"version": "21.12.3"
},
{
"status": "affected",
"version": "21.15.0"
},
{
"status": "affected",
"version": "21.11.2"
},
{
"status": "affected",
"version": "21.13.7"
},
{
"status": "affected",
"version": "21.12.4"
},
{
"status": "affected",
"version": "21.12.12"
},
{
"status": "affected",
"version": "21.13.4"
},
{
"status": "affected",
"version": "21.12.5"
},
{
"status": "affected",
"version": "21.14.a0"
},
{
"status": "affected",
"version": "21.11.9"
},
{
"status": "affected",
"version": "21.14.0"
},
{
"status": "affected",
"version": "21.11.4"
},
{
"status": "affected",
"version": "21.12.7"
},
{
"status": "affected",
"version": "21.14.3"
},
{
"status": "affected",
"version": "21.12.2"
},
{
"status": "affected",
"version": "21.14.10"
},
{
"status": "affected",
"version": "21.15.4"
},
{
"status": "affected",
"version": "21.14.6"
},
{
"status": "affected",
"version": "21.15.3"
},
{
"status": "affected",
"version": "21.13.13"
},
{
"status": "affected",
"version": "21.12.11"
},
{
"status": "affected",
"version": "21.12.10"
},
{
"status": "affected",
"version": "21.14.9"
},
{
"status": "affected",
"version": "21.11.1"
},
{
"status": "affected",
"version": "21.14.7"
},
{
"status": "affected",
"version": "21.11.3"
},
{
"status": "affected",
"version": "21.13.3"
},
{
"status": "affected",
"version": "21.13.2"
},
{
"status": "affected",
"version": "21.13.14"
},
{
"status": "affected",
"version": "21.12.1"
},
{
"status": "affected",
"version": "21.13.6"
},
{
"status": "affected",
"version": "21.13.12"
},
{
"status": "affected",
"version": "21.15.8"
},
{
"status": "affected",
"version": "21.13.1"
},
{
"status": "affected",
"version": "21.15.1"
},
{
"status": "affected",
"version": "21.15.6"
},
{
"status": "affected",
"version": "21.13.9"
},
{
"status": "affected",
"version": "21.14.4"
},
{
"status": "affected",
"version": "21.13.0"
},
{
"status": "affected",
"version": "21.12.6"
},
{
"status": "affected",
"version": "21.14.8"
},
{
"status": "affected",
"version": "21.11.0"
},
{
"status": "affected",
"version": "21.15.15"
},
{
"status": "affected",
"version": "21.14.11"
},
{
"status": "affected",
"version": "21.17.2"
},
{
"status": "affected",
"version": "21.15.13"
},
{
"status": "affected",
"version": "21.15.12"
},
{
"status": "affected",
"version": "21.14.b15"
},
{
"status": "affected",
"version": "21.17.0"
},
{
"status": "affected",
"version": "21.15.10"
},
{
"status": "affected",
"version": "21.13.16"
},
{
"status": "affected",
"version": "21.14.12"
},
{
"status": "affected",
"version": "21.15.20"
},
{
"status": "affected",
"version": "21.11.10"
},
{
"status": "affected",
"version": "21.15.18"
},
{
"status": "affected",
"version": "21.15.14"
},
{
"status": "affected",
"version": "21.13.15"
},
{
"status": "affected",
"version": "21.15.21"
},
{
"status": "affected",
"version": "21.15.17"
},
{
"status": "affected",
"version": "21.17.1"
},
{
"status": "affected",
"version": "21.14.b14"
},
{
"status": "affected",
"version": "21.12.13"
},
{
"status": "affected",
"version": "21.12.14"
},
{
"status": "affected",
"version": "21.15.19"
},
{
"status": "affected",
"version": "21.15.11"
},
{
"status": "affected",
"version": "21.15.22"
},
{
"status": "affected",
"version": "21.17.3"
},
{
"status": "affected",
"version": "21.14.b13"
},
{
"status": "affected",
"version": "21.15.16"
},
{
"status": "affected",
"version": "21.14.b12"
},
{
"status": "affected",
"version": "21.16.2"
},
{
"status": "affected",
"version": "21.14.16"
},
{
"status": "affected",
"version": "21.14.b17"
},
{
"status": "affected",
"version": "21.15.24"
},
{
"status": "affected",
"version": "21.16.c9"
},
{
"status": "affected",
"version": "21.15.25"
},
{
"status": "affected",
"version": "21.15.26"
},
{
"status": "affected",
"version": "21.16.d0"
},
{
"status": "affected",
"version": "21.17.4"
},
{
"status": "affected",
"version": "21.15.27"
},
{
"status": "affected",
"version": "21.13.17"
},
{
"status": "affected",
"version": "21.18.0"
},
{
"status": "affected",
"version": "21.15.28"
},
{
"status": "affected",
"version": "21.14.17"
},
{
"status": "affected",
"version": "21.16.d1"
},
{
"status": "affected",
"version": "21.18.1"
},
{
"status": "affected",
"version": "21.16.3"
},
{
"status": "affected",
"version": "21.14.b18"
},
{
"status": "affected",
"version": "21.16.c10"
},
{
"status": "affected",
"version": "21.11.11"
},
{
"status": "affected",
"version": "21.15.29"
},
{
"status": "affected",
"version": "21.15.30"
},
{
"status": "affected",
"version": "21.13.18"
},
{
"status": "affected",
"version": "21.12.16"
},
{
"status": "affected",
"version": "21.17.5"
},
{
"status": "affected",
"version": "21.16.c11"
},
{
"status": "affected",
"version": "21.15.32"
},
{
"status": "affected",
"version": "21.13.19"
},
{
"status": "affected",
"version": "21.15.33"
},
{
"status": "affected",
"version": "21.11.12"
},
{
"status": "affected",
"version": "21.19.0"
},
{
"status": "affected",
"version": "21.18.2"
},
{
"status": "affected",
"version": "21.14.19"
},
{
"status": "affected",
"version": "21.19.1"
},
{
"status": "affected",
"version": "21.17.6"
},
{
"status": "affected",
"version": "21.11.13"
},
{
"status": "affected",
"version": "21.12.17"
},
{
"status": "affected",
"version": "21.15.36"
},
{
"status": "affected",
"version": "21.18.3"
},
{
"status": "affected",
"version": "21.14.b19"
},
{
"status": "affected",
"version": "21.19.2"
},
{
"status": "affected",
"version": "21.15.37"
},
{
"status": "affected",
"version": "21.17.7"
},
{
"status": "affected",
"version": "21.14.20"
},
{
"status": "affected",
"version": "21.16.c12"
},
{
"status": "affected",
"version": "21.18.4"
},
{
"status": "affected",
"version": "21.19.3"
},
{
"status": "affected",
"version": "21.13.20"
},
{
"status": "affected",
"version": "21.15.40"
},
{
"status": "affected",
"version": "21.14.b20"
},
{
"status": "affected",
"version": "21.16.4"
},
{
"status": "affected",
"version": "21.18.5"
},
{
"status": "affected",
"version": "21.14.b21"
},
{
"status": "affected",
"version": "21.16.c13"
},
{
"status": "affected",
"version": "21.11.14"
},
{
"status": "affected",
"version": "21.12.18"
},
{
"status": "affected",
"version": "21.20.SV1"
},
{
"status": "affected",
"version": "21.20.0"
},
{
"status": "affected",
"version": "21.15.41"
},
{
"status": "affected",
"version": "21.20.SV2"
},
{
"status": "affected",
"version": "21.17.8"
},
{
"status": "affected",
"version": "21.20.1"
},
{
"status": "affected",
"version": "21.20.SV3"
},
{
"status": "affected",
"version": "21.16.5"
},
{
"status": "affected",
"version": "21.20.SV5"
},
{
"status": "affected",
"version": "21.15.43"
},
{
"status": "affected",
"version": "21.19.4"
},
{
"status": "affected",
"version": "21.18.6"
},
{
"status": "affected",
"version": "21.15.45"
},
{
"status": "affected",
"version": "21.20.2"
},
{
"status": "affected",
"version": "21.16.c14"
},
{
"status": "affected",
"version": "21.17.9"
},
{
"status": "affected",
"version": "21.11.15"
},
{
"status": "affected",
"version": "21.14.22"
},
{
"status": "affected",
"version": "21.20.3"
},
{
"status": "affected",
"version": "21.15.46"
},
{
"status": "affected",
"version": "21.18.7"
},
{
"status": "affected",
"version": "21.19.n3"
},
{
"status": "affected",
"version": "21.15.47"
},
{
"status": "affected",
"version": "21.15.48"
},
{
"status": "affected",
"version": "21.19.5"
},
{
"status": "affected",
"version": "21.17.10"
},
{
"status": "affected",
"version": "21.18.8"
},
{
"status": "affected",
"version": "21.16.6"
},
{
"status": "affected",
"version": "21.12.19"
},
{
"status": "affected",
"version": "21.13.21"
},
{
"status": "affected",
"version": "21.20.4"
},
{
"status": "affected",
"version": "21.18.9"
},
{
"status": "affected",
"version": "21.19.n4"
},
{
"status": "affected",
"version": "21.17.11"
},
{
"status": "affected",
"version": "21.18.11"
},
{
"status": "affected",
"version": "21.19.6"
},
{
"status": "affected",
"version": "21.16.c15"
},
{
"status": "affected",
"version": "21.16.7"
},
{
"status": "affected",
"version": "21.17.12"
},
{
"status": "affected",
"version": "21.21.0"
},
{
"status": "affected",
"version": "21.17.13"
},
{
"status": "affected",
"version": "21.11.16"
},
{
"status": "affected",
"version": "21.12.20"
},
{
"status": "affected",
"version": "21.18.12"
},
{
"status": "affected",
"version": "21.12.21"
},
{
"status": "affected",
"version": "21.14.b22"
},
{
"status": "affected",
"version": "21.19.7"
},
{
"status": "affected",
"version": "21.20.6"
},
{
"status": "affected",
"version": "21.18.13"
},
{
"status": "affected",
"version": "21.19.n5"
},
{
"status": "affected",
"version": "21.18.14"
},
{
"status": "affected",
"version": "21.20.7"
},
{
"status": "affected",
"version": "21.11.17"
},
{
"status": "affected",
"version": "21.17.14"
},
{
"status": "affected",
"version": "21.19.8"
},
{
"status": "affected",
"version": "21.20.8"
},
{
"status": "affected",
"version": "21.19.9"
},
{
"status": "affected",
"version": "21.17.15"
},
{
"status": "affected",
"version": "21.20.9"
},
{
"status": "affected",
"version": "21.18.15"
},
{
"status": "affected",
"version": "21.15.51"
},
{
"status": "affected",
"version": "21.14.23"
},
{
"status": "affected",
"version": "21.19.10"
},
{
"status": "affected",
"version": "21.20.k6"
},
{
"status": "affected",
"version": "21.11.18"
},
{
"status": "affected",
"version": "21.19.n6"
},
{
"status": "affected",
"version": "21.16.8"
},
{
"status": "affected",
"version": "21.15.52"
},
{
"status": "affected",
"version": "21.17.16"
},
{
"status": "affected",
"version": "21.20.10"
},
{
"status": "affected",
"version": "21.15.53"
},
{
"status": "affected",
"version": "21.11.19"
},
{
"status": "affected",
"version": "21.20.k7"
},
{
"status": "affected",
"version": "21.15.54"
},
{
"status": "affected",
"version": "21.20.11"
},
{
"status": "affected",
"version": "21.20.u8"
},
{
"status": "affected",
"version": "21.21.1"
},
{
"status": "affected",
"version": "21.17.17"
},
{
"status": "affected",
"version": "21.15.55"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ipsecmgr process of Cisco\u0026nbsp;ASR 5000 Series Software (StarOS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\nThis vulnerability is due to insufficient validation of incoming Internet Key Exchange Version 2 (IKEv2) packets. An attacker could exploit this vulnerability by sending specifically malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause the ipsecmgr process to restart, which would disrupt ongoing IKE negotiations and result in a temporary DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/RL:X/RC:X/E:X",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-18T15:35:11.060Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-staros-ipsecmgr-dos-3gkHXwvS",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the October 2021 release of the Cisco\u0026nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773\"\u003eCisco\u0026nbsp;Event Response: October 2021 Cisco\u0026nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ"
},
{
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the September 2021 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74637\"\u003eCisco\u0026nbsp;Event Response: September 2021 Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk"
}
],
"source": {
"advisory": "cisco-sa-staros-ipsecmgr-dos-3gkHXwvS",
"defects": [
"CSCvv74352"
],
"discovery": "INTERNAL"
},
"title": "Cisco ASR 5000 Series Software (StarOS) ipsecmgr Process Denial of Service Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1424",
"datePublished": "2024-11-18T15:35:11.060Z",
"dateReserved": "2020-11-13T00:00:00.000Z",
"dateUpdated": "2024-11-18T16:18:16.475Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the ipsecmgr process of Cisco\u0026nbsp;ASR 5000 Series Software (StarOS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\\r\\nThis vulnerability is due to insufficient validation of incoming Internet Key Exchange Version 2 (IKEv2) packets. An attacker could exploit this vulnerability by sending specifically malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause the ipsecmgr process to restart, which would disrupt ongoing IKE negotiations and result in a temporary DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el proceso ipsecmgr del software Cisco ASR 5000 Series (StarOS) podr\\u00eda permitir que un atacante remoto no autenticado provoque una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a una validaci\\u00f3n insuficiente de los paquetes entrantes de Internet Key Exchange versi\\u00f3n 2 (IKEv2). Un atacante podr\\u00eda aprovechar esta vulnerabilidad enviando paquetes IKEv2 espec\\u00edficamente malformados a un dispositivo afectado. Una explotaci\\u00f3n exitosa podr\\u00eda permitir que el atacante haga que el proceso ipsecmgr se reinicie, lo que interrumpir\\u00eda las negociaciones IKE en curso y dar\\u00eda como resultado una condici\\u00f3n de DoS temporal. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad.\"}]",
"id": "CVE-2021-1424",
"lastModified": "2024-11-21T05:44:19.980",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
"published": "2024-11-18T16:15:09.823",
"references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk\", \"source\": \"ykramarz@cisco.com\"}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-1424\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-11-18T16:15:09.823\",\"lastModified\":\"2024-11-21T05:44:19.980\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the ipsecmgr process of Cisco\u0026nbsp;ASR 5000 Series Software (StarOS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\\r\\nThis vulnerability is due to insufficient validation of incoming Internet Key Exchange Version 2 (IKEv2) packets. An attacker could exploit this vulnerability by sending specifically malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause the ipsecmgr process to restart, which would disrupt ongoing IKE negotiations and result in a temporary DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el proceso ipsecmgr del software Cisco ASR 5000 Series (StarOS) podr\u00eda permitir que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los paquetes entrantes de Internet Key Exchange versi\u00f3n 2 (IKEv2). Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando paquetes IKEv2 espec\u00edficamente malformados a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el proceso ipsecmgr se reinicie, lo que interrumpir\u00eda las negociaciones IKE en curso y dar\u00eda como resultado una condici\u00f3n de DoS temporal. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. No existen workarounds que solucionen esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk\",\"source\":\"psirt@cisco.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-1424\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-18T15:57:49.747227Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:asr_5000_series_software:21.15.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.a0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.20:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.21:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.22:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.24:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.25:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.26:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.d0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.27:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.28:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.d1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b18:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.29:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.30:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.32:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.33:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.36:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b19:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.37:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.20:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.20:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.40:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b20:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b21:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.41:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.sv5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.43:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.45:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.22:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.46:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n3:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.47:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.48:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.13.21:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n4:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.c15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.21.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.20:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.12:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.12.21:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.b22:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.13:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n5:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.14:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.18.15:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.51:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.14.23:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.k6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.18:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.19.n6:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.16.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.52:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.16:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.53:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.11.19:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.k7:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.54:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.11:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.20.u8:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.21.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.17.17:*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:asr_5000_series_software:21.15.55:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"asr_5000_series_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"21.15.7\"}, {\"status\": \"affected\", \"version\": \"21.13.10\"}, {\"status\": \"affected\", \"version\": \"21.14.1\"}, {\"status\": \"affected\", \"version\": \"21.11.5\"}, {\"status\": \"affected\", \"version\": \"21.13.8\"}, {\"status\": \"affected\", \"version\": \"21.14.5\"}, {\"status\": \"affected\", \"version\": \"21.12.8\"}, {\"status\": \"affected\", \"version\": \"21.13.11\"}, {\"status\": \"affected\", \"version\": \"21.11.8\"}, {\"status\": \"affected\", \"version\": \"21.12.9\"}, {\"status\": \"affected\", \"version\": \"21.15.5\"}, {\"status\": \"affected\", \"version\": \"21.11.7\"}, {\"status\": \"affected\", \"version\": \"21.13.5\"}, {\"status\": \"affected\", \"version\": \"21.12.0\"}, {\"status\": \"affected\", \"version\": \"21.15.2\"}, {\"status\": \"affected\", \"version\": \"21.11.6\"}, {\"status\": \"affected\", \"version\": \"21.14.2\"}, {\"status\": \"affected\", \"version\": \"21.12.3\"}, {\"status\": \"affected\", \"version\": \"21.15.0\"}, {\"status\": \"affected\", \"version\": \"21.11.2\"}, {\"status\": \"affected\", \"version\": \"21.13.7\"}, {\"status\": \"affected\", \"version\": \"21.12.4\"}, {\"status\": \"affected\", \"version\": \"21.12.12\"}, {\"status\": \"affected\", \"version\": \"21.13.4\"}, {\"status\": \"affected\", \"version\": \"21.12.5\"}, {\"status\": \"affected\", \"version\": \"21.14.a0\"}, {\"status\": \"affected\", \"version\": \"21.11.9\"}, {\"status\": \"affected\", \"version\": \"21.14.0\"}, {\"status\": \"affected\", \"version\": \"21.11.4\"}, {\"status\": \"affected\", \"version\": \"21.12.7\"}, {\"status\": \"affected\", \"version\": \"21.14.3\"}, {\"status\": \"affected\", \"version\": \"21.12.2\"}, {\"status\": \"affected\", \"version\": \"21.14.10\"}, {\"status\": \"affected\", \"version\": \"21.15.4\"}, {\"status\": \"affected\", \"version\": \"21.14.6\"}, {\"status\": \"affected\", \"version\": \"21.15.3\"}, {\"status\": \"affected\", \"version\": \"21.13.13\"}, {\"status\": \"affected\", \"version\": \"21.12.11\"}, {\"status\": \"affected\", \"version\": \"21.12.10\"}, {\"status\": \"affected\", \"version\": \"21.14.9\"}, {\"status\": \"affected\", \"version\": \"21.11.1\"}, {\"status\": \"affected\", \"version\": \"21.14.7\"}, {\"status\": \"affected\", \"version\": \"21.11.3\"}, {\"status\": \"affected\", \"version\": \"21.13.3\"}, {\"status\": \"affected\", \"version\": \"21.13.2\"}, {\"status\": \"affected\", \"version\": \"21.13.14\"}, {\"status\": \"affected\", \"version\": \"21.12.1\"}, {\"status\": \"affected\", \"version\": \"21.13.6\"}, {\"status\": \"affected\", \"version\": \"21.13.12\"}, {\"status\": \"affected\", \"version\": \"21.15.8\"}, {\"status\": \"affected\", \"version\": \"21.13.1\"}, {\"status\": \"affected\", \"version\": \"21.15.1\"}, {\"status\": \"affected\", \"version\": \"21.15.6\"}, {\"status\": \"affected\", \"version\": \"21.13.9\"}, {\"status\": \"affected\", \"version\": \"21.14.4\"}, {\"status\": \"affected\", \"version\": \"21.13.0\"}, {\"status\": \"affected\", \"version\": \"21.12.6\"}, {\"status\": \"affected\", \"version\": \"21.14.8\"}, {\"status\": \"affected\", \"version\": \"21.11.0\"}, {\"status\": \"affected\", \"version\": \"21.15.15\"}, {\"status\": \"affected\", \"version\": \"21.14.11\"}, {\"status\": \"affected\", \"version\": \"21.17.2\"}, {\"status\": \"affected\", \"version\": \"21.15.13\"}, {\"status\": \"affected\", \"version\": \"21.15.12\"}, {\"status\": \"affected\", \"version\": \"21.14.b15\"}, {\"status\": \"affected\", \"version\": \"21.17.0\"}, {\"status\": \"affected\", \"version\": \"21.15.10\"}, {\"status\": \"affected\", \"version\": \"21.13.16\"}, {\"status\": \"affected\", \"version\": \"21.14.12\"}, {\"status\": \"affected\", \"version\": \"21.15.20\"}, {\"status\": \"affected\", \"version\": \"21.11.10\"}, {\"status\": \"affected\", \"version\": \"21.15.18\"}, {\"status\": \"affected\", \"version\": \"21.15.14\"}, {\"status\": \"affected\", \"version\": \"21.13.15\"}, {\"status\": \"affected\", \"version\": \"21.15.21\"}, {\"status\": \"affected\", \"version\": \"21.15.17\"}, {\"status\": \"affected\", \"version\": \"21.17.1\"}, {\"status\": \"affected\", \"version\": \"21.14.b14\"}, {\"status\": \"affected\", \"version\": \"21.12.13\"}, {\"status\": \"affected\", \"version\": \"21.12.14\"}, {\"status\": \"affected\", \"version\": \"21.15.19\"}, {\"status\": \"affected\", \"version\": \"21.15.11\"}, {\"status\": \"affected\", \"version\": \"21.15.22\"}, {\"status\": \"affected\", \"version\": \"21.17.3\"}, {\"status\": \"affected\", \"version\": \"21.14.b13\"}, {\"status\": \"affected\", \"version\": \"21.15.16\"}, {\"status\": \"affected\", \"version\": \"21.14.b12\"}, {\"status\": \"affected\", \"version\": \"21.16.2\"}, {\"status\": \"affected\", \"version\": \"21.14.16\"}, {\"status\": \"affected\", \"version\": \"21.14.b17\"}, {\"status\": \"affected\", \"version\": \"21.15.24\"}, {\"status\": \"affected\", \"version\": \"21.16.c9\"}, {\"status\": \"affected\", \"version\": \"21.15.25\"}, {\"status\": \"affected\", \"version\": \"21.15.26\"}, {\"status\": \"affected\", \"version\": \"21.16.d0\"}, {\"status\": \"affected\", \"version\": \"21.17.4\"}, {\"status\": \"affected\", \"version\": \"21.15.27\"}, {\"status\": \"affected\", \"version\": \"21.13.17\"}, {\"status\": \"affected\", \"version\": \"21.18.0\"}, {\"status\": \"affected\", \"version\": \"21.15.28\"}, {\"status\": \"affected\", \"version\": \"21.14.17\"}, {\"status\": \"affected\", \"version\": \"21.16.d1\"}, {\"status\": \"affected\", \"version\": \"21.18.1\"}, {\"status\": \"affected\", \"version\": \"21.16.3\"}, {\"status\": \"affected\", \"version\": \"21.14.b18\"}, {\"status\": \"affected\", \"version\": \"21.16.c10\"}, {\"status\": \"affected\", \"version\": \"21.11.11\"}, {\"status\": \"affected\", \"version\": \"21.15.29\"}, {\"status\": \"affected\", \"version\": \"21.15.30\"}, {\"status\": \"affected\", \"version\": \"21.13.18\"}, {\"status\": \"affected\", \"version\": \"21.12.16\"}, {\"status\": \"affected\", \"version\": \"21.17.5\"}, {\"status\": \"affected\", \"version\": \"21.16.c11\"}, {\"status\": \"affected\", \"version\": \"21.15.32\"}, {\"status\": \"affected\", \"version\": \"21.13.19\"}, {\"status\": \"affected\", \"version\": \"21.15.33\"}, {\"status\": \"affected\", \"version\": \"21.11.12\"}, {\"status\": \"affected\", \"version\": \"21.19.0\"}, {\"status\": \"affected\", \"version\": \"21.18.2\"}, {\"status\": \"affected\", \"version\": \"21.14.19\"}, {\"status\": \"affected\", \"version\": \"21.19.1\"}, {\"status\": \"affected\", \"version\": \"21.17.6\"}, {\"status\": \"affected\", \"version\": \"21.11.13\"}, {\"status\": \"affected\", \"version\": \"21.12.17\"}, {\"status\": \"affected\", \"version\": \"21.15.36\"}, {\"status\": \"affected\", \"version\": \"21.18.3\"}, {\"status\": \"affected\", \"version\": \"21.14.b19\"}, {\"status\": \"affected\", \"version\": \"21.19.2\"}, {\"status\": \"affected\", \"version\": \"21.15.37\"}, {\"status\": \"affected\", \"version\": \"21.17.7\"}, {\"status\": \"affected\", \"version\": \"21.14.20\"}, {\"status\": \"affected\", \"version\": \"21.16.c12\"}, {\"status\": \"affected\", \"version\": \"21.18.4\"}, {\"status\": \"affected\", \"version\": \"21.19.3\"}, {\"status\": \"affected\", \"version\": \"21.13.20\"}, {\"status\": \"affected\", \"version\": \"21.15.40\"}, {\"status\": \"affected\", \"version\": \"21.14.b20\"}, {\"status\": \"affected\", \"version\": \"21.16.4\"}, {\"status\": \"affected\", \"version\": \"21.18.5\"}, {\"status\": \"affected\", \"version\": \"21.14.b21\"}, {\"status\": \"affected\", \"version\": \"21.16.c13\"}, {\"status\": \"affected\", \"version\": \"21.11.14\"}, {\"status\": \"affected\", \"version\": \"21.12.18\"}, {\"status\": \"affected\", \"version\": \"21.20.sv1\"}, {\"status\": \"affected\", \"version\": \"21.20.0\"}, {\"status\": \"affected\", \"version\": \"21.15.41\"}, {\"status\": \"affected\", \"version\": \"21.20.sv2\"}, {\"status\": \"affected\", \"version\": \"21.17.8\"}, {\"status\": \"affected\", \"version\": \"21.20.1\"}, {\"status\": \"affected\", \"version\": \"21.20.sv3\"}, {\"status\": \"affected\", \"version\": \"21.16.5\"}, {\"status\": \"affected\", \"version\": \"21.20.sv5\"}, {\"status\": \"affected\", \"version\": \"21.15.43\"}, {\"status\": \"affected\", \"version\": \"21.19.4\"}, {\"status\": \"affected\", \"version\": \"21.18.6\"}, {\"status\": \"affected\", \"version\": \"21.15.45\"}, {\"status\": \"affected\", \"version\": \"21.20.2\"}, {\"status\": \"affected\", \"version\": \"21.16.c14\"}, {\"status\": \"affected\", \"version\": \"21.17.9\"}, {\"status\": \"affected\", \"version\": \"21.11.15\"}, {\"status\": \"affected\", \"version\": \"21.14.22\"}, {\"status\": \"affected\", \"version\": \"21.20.3\"}, {\"status\": \"affected\", \"version\": \"21.15.46\"}, {\"status\": \"affected\", \"version\": \"21.18.7\"}, {\"status\": \"affected\", \"version\": \"21.19.n3\"}, {\"status\": \"affected\", \"version\": \"21.15.47\"}, {\"status\": \"affected\", \"version\": \"21.15.48\"}, {\"status\": \"affected\", \"version\": \"21.19.5\"}, {\"status\": \"affected\", \"version\": \"21.17.10\"}, {\"status\": \"affected\", \"version\": \"21.18.8\"}, {\"status\": \"affected\", \"version\": \"21.16.6\"}, {\"status\": \"affected\", \"version\": \"21.12.19\"}, {\"status\": \"affected\", \"version\": \"21.13.21\"}, {\"status\": \"affected\", \"version\": \"21.20.4\"}, {\"status\": \"affected\", \"version\": \"21.18.9\"}, {\"status\": \"affected\", \"version\": \"21.19.n4\"}, {\"status\": \"affected\", \"version\": \"21.17.11\"}, {\"status\": \"affected\", \"version\": \"21.18.11\"}, {\"status\": \"affected\", \"version\": \"21.19.6\"}, {\"status\": \"affected\", \"version\": \"21.16.c15\"}, {\"status\": \"affected\", \"version\": \"21.16.7\"}, {\"status\": \"affected\", \"version\": \"21.17.12\"}, {\"status\": \"affected\", \"version\": \"21.21.0\"}, {\"status\": \"affected\", \"version\": \"21.17.13\"}, {\"status\": \"affected\", \"version\": \"21.11.16\"}, {\"status\": \"affected\", \"version\": \"21.12.20\"}, {\"status\": \"affected\", \"version\": \"21.18.12\"}, {\"status\": \"affected\", \"version\": \"21.12.21\"}, {\"status\": \"affected\", \"version\": \"21.14.b22\"}, {\"status\": \"affected\", \"version\": \"21.19.7\"}, {\"status\": \"affected\", \"version\": \"21.20.6\"}, {\"status\": \"affected\", \"version\": \"21.18.13\"}, {\"status\": \"affected\", \"version\": \"21.19.n5\"}, {\"status\": \"affected\", \"version\": \"21.18.14\"}, {\"status\": \"affected\", \"version\": \"21.20.7\"}, {\"status\": \"affected\", \"version\": \"21.11.17\"}, {\"status\": \"affected\", \"version\": \"21.17.14\"}, {\"status\": \"affected\", \"version\": \"21.19.8\"}, {\"status\": \"affected\", \"version\": \"21.20.8\"}, {\"status\": \"affected\", \"version\": \"21.19.9\"}, {\"status\": \"affected\", \"version\": \"21.17.15\"}, {\"status\": \"affected\", \"version\": \"21.20.9\"}, {\"status\": \"affected\", \"version\": \"21.18.15\"}, {\"status\": \"affected\", \"version\": \"21.15.51\"}, {\"status\": \"affected\", \"version\": \"21.14.23\"}, {\"status\": \"affected\", \"version\": \"21.19.10\"}, {\"status\": \"affected\", \"version\": \"21.20.k6\"}, {\"status\": \"affected\", \"version\": \"21.11.18\"}, {\"status\": \"affected\", \"version\": \"21.19.n6\"}, {\"status\": \"affected\", \"version\": \"21.16.8\"}, {\"status\": \"affected\", \"version\": \"21.15.52\"}, {\"status\": \"affected\", \"version\": \"21.17.16\"}, {\"status\": \"affected\", \"version\": \"21.20.10\"}, {\"status\": \"affected\", \"version\": \"21.15.53\"}, {\"status\": \"affected\", \"version\": \"21.11.19\"}, {\"status\": \"affected\", \"version\": \"21.20.k7\"}, {\"status\": \"affected\", \"version\": \"21.15.54\"}, {\"status\": \"affected\", \"version\": \"21.20.11\"}, {\"status\": \"affected\", \"version\": \"21.20.u8\"}, {\"status\": \"affected\", \"version\": \"21.21.1\"}, {\"status\": \"affected\", \"version\": \"21.17.17\"}, {\"status\": \"affected\", \"version\": \"21.15.55\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-18T16:12:33.336Z\"}}], \"cna\": {\"title\": \"Cisco ASR 5000 Series Software (StarOS) ipsecmgr Process Denial of Service Vulnerability\", \"source\": {\"defects\": [\"CSCvv74352\"], \"advisory\": \"cisco-sa-staros-ipsecmgr-dos-3gkHXwvS\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/RL:X/RC:X/E:X\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco ASR 5000 Series Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"21.15.7\"}, {\"status\": \"affected\", \"version\": \"21.13.10\"}, {\"status\": \"affected\", \"version\": \"21.14.1\"}, {\"status\": \"affected\", \"version\": \"21.11.5\"}, {\"status\": \"affected\", \"version\": \"21.13.8\"}, {\"status\": \"affected\", \"version\": \"21.14.5\"}, {\"status\": \"affected\", \"version\": \"21.12.8\"}, {\"status\": \"affected\", \"version\": \"21.13.11\"}, {\"status\": \"affected\", \"version\": \"21.11.8\"}, {\"status\": \"affected\", \"version\": \"21.12.9\"}, {\"status\": \"affected\", \"version\": \"21.15.5\"}, {\"status\": \"affected\", \"version\": \"21.11.7\"}, {\"status\": \"affected\", \"version\": \"21.13.5\"}, {\"status\": \"affected\", \"version\": \"21.12.0\"}, {\"status\": \"affected\", \"version\": \"21.15.2\"}, {\"status\": \"affected\", \"version\": \"21.11.6\"}, {\"status\": \"affected\", \"version\": \"21.14.2\"}, {\"status\": \"affected\", \"version\": \"21.12.3\"}, {\"status\": \"affected\", \"version\": \"21.15.0\"}, {\"status\": \"affected\", \"version\": \"21.11.2\"}, {\"status\": \"affected\", \"version\": \"21.13.7\"}, {\"status\": \"affected\", \"version\": \"21.12.4\"}, {\"status\": \"affected\", \"version\": \"21.12.12\"}, {\"status\": \"affected\", \"version\": \"21.13.4\"}, {\"status\": \"affected\", \"version\": \"21.12.5\"}, {\"status\": \"affected\", \"version\": \"21.14.a0\"}, {\"status\": \"affected\", \"version\": \"21.11.9\"}, {\"status\": \"affected\", \"version\": \"21.14.0\"}, {\"status\": \"affected\", \"version\": \"21.11.4\"}, {\"status\": \"affected\", \"version\": \"21.12.7\"}, {\"status\": \"affected\", \"version\": \"21.14.3\"}, {\"status\": \"affected\", \"version\": \"21.12.2\"}, {\"status\": \"affected\", \"version\": \"21.14.10\"}, {\"status\": \"affected\", \"version\": \"21.15.4\"}, {\"status\": \"affected\", \"version\": \"21.14.6\"}, {\"status\": \"affected\", \"version\": \"21.15.3\"}, {\"status\": \"affected\", \"version\": \"21.13.13\"}, {\"status\": \"affected\", \"version\": \"21.12.11\"}, {\"status\": \"affected\", \"version\": \"21.12.10\"}, {\"status\": \"affected\", \"version\": \"21.14.9\"}, {\"status\": \"affected\", \"version\": \"21.11.1\"}, {\"status\": \"affected\", \"version\": \"21.14.7\"}, {\"status\": \"affected\", \"version\": \"21.11.3\"}, {\"status\": \"affected\", \"version\": \"21.13.3\"}, {\"status\": \"affected\", \"version\": \"21.13.2\"}, {\"status\": \"affected\", \"version\": \"21.13.14\"}, {\"status\": \"affected\", \"version\": \"21.12.1\"}, {\"status\": \"affected\", \"version\": \"21.13.6\"}, {\"status\": \"affected\", \"version\": \"21.13.12\"}, {\"status\": \"affected\", \"version\": \"21.15.8\"}, {\"status\": \"affected\", \"version\": \"21.13.1\"}, {\"status\": \"affected\", \"version\": \"21.15.1\"}, {\"status\": \"affected\", \"version\": \"21.15.6\"}, {\"status\": \"affected\", \"version\": \"21.13.9\"}, {\"status\": \"affected\", \"version\": \"21.14.4\"}, {\"status\": \"affected\", \"version\": \"21.13.0\"}, {\"status\": \"affected\", \"version\": \"21.12.6\"}, {\"status\": \"affected\", \"version\": \"21.14.8\"}, {\"status\": \"affected\", \"version\": \"21.11.0\"}, {\"status\": \"affected\", \"version\": \"21.15.15\"}, {\"status\": \"affected\", \"version\": \"21.14.11\"}, {\"status\": \"affected\", \"version\": \"21.17.2\"}, {\"status\": \"affected\", \"version\": \"21.15.13\"}, {\"status\": \"affected\", \"version\": \"21.15.12\"}, {\"status\": \"affected\", \"version\": \"21.14.b15\"}, {\"status\": \"affected\", \"version\": \"21.17.0\"}, {\"status\": \"affected\", \"version\": \"21.15.10\"}, {\"status\": \"affected\", \"version\": \"21.13.16\"}, {\"status\": \"affected\", \"version\": \"21.14.12\"}, {\"status\": \"affected\", \"version\": \"21.15.20\"}, {\"status\": \"affected\", \"version\": \"21.11.10\"}, {\"status\": \"affected\", \"version\": \"21.15.18\"}, {\"status\": \"affected\", \"version\": \"21.15.14\"}, {\"status\": \"affected\", \"version\": \"21.13.15\"}, {\"status\": \"affected\", \"version\": \"21.15.21\"}, {\"status\": \"affected\", \"version\": \"21.15.17\"}, {\"status\": \"affected\", \"version\": \"21.17.1\"}, {\"status\": \"affected\", \"version\": \"21.14.b14\"}, {\"status\": \"affected\", \"version\": \"21.12.13\"}, {\"status\": \"affected\", \"version\": \"21.12.14\"}, {\"status\": \"affected\", \"version\": \"21.15.19\"}, {\"status\": \"affected\", \"version\": \"21.15.11\"}, {\"status\": \"affected\", \"version\": \"21.15.22\"}, {\"status\": \"affected\", \"version\": \"21.17.3\"}, {\"status\": \"affected\", \"version\": \"21.14.b13\"}, {\"status\": \"affected\", \"version\": \"21.15.16\"}, {\"status\": \"affected\", \"version\": \"21.14.b12\"}, {\"status\": \"affected\", \"version\": \"21.16.2\"}, {\"status\": \"affected\", \"version\": \"21.14.16\"}, {\"status\": \"affected\", \"version\": \"21.14.b17\"}, {\"status\": \"affected\", \"version\": \"21.15.24\"}, {\"status\": \"affected\", \"version\": \"21.16.c9\"}, {\"status\": \"affected\", \"version\": \"21.15.25\"}, {\"status\": \"affected\", \"version\": \"21.15.26\"}, {\"status\": \"affected\", \"version\": \"21.16.d0\"}, {\"status\": \"affected\", \"version\": \"21.17.4\"}, {\"status\": \"affected\", \"version\": \"21.15.27\"}, {\"status\": \"affected\", \"version\": \"21.13.17\"}, {\"status\": \"affected\", \"version\": \"21.18.0\"}, {\"status\": \"affected\", \"version\": \"21.15.28\"}, {\"status\": \"affected\", \"version\": \"21.14.17\"}, {\"status\": \"affected\", \"version\": \"21.16.d1\"}, {\"status\": \"affected\", \"version\": \"21.18.1\"}, {\"status\": \"affected\", \"version\": \"21.16.3\"}, {\"status\": \"affected\", \"version\": \"21.14.b18\"}, {\"status\": \"affected\", \"version\": \"21.16.c10\"}, {\"status\": \"affected\", \"version\": \"21.11.11\"}, {\"status\": \"affected\", \"version\": \"21.15.29\"}, {\"status\": \"affected\", \"version\": \"21.15.30\"}, {\"status\": \"affected\", \"version\": \"21.13.18\"}, {\"status\": \"affected\", \"version\": \"21.12.16\"}, {\"status\": \"affected\", \"version\": \"21.17.5\"}, {\"status\": \"affected\", \"version\": \"21.16.c11\"}, {\"status\": \"affected\", \"version\": \"21.15.32\"}, {\"status\": \"affected\", \"version\": \"21.13.19\"}, {\"status\": \"affected\", \"version\": \"21.15.33\"}, {\"status\": \"affected\", \"version\": \"21.11.12\"}, {\"status\": \"affected\", \"version\": \"21.19.0\"}, {\"status\": \"affected\", \"version\": \"21.18.2\"}, {\"status\": \"affected\", \"version\": \"21.14.19\"}, {\"status\": \"affected\", \"version\": \"21.19.1\"}, {\"status\": \"affected\", \"version\": \"21.17.6\"}, {\"status\": \"affected\", \"version\": \"21.11.13\"}, {\"status\": \"affected\", \"version\": \"21.12.17\"}, {\"status\": \"affected\", \"version\": \"21.15.36\"}, {\"status\": \"affected\", \"version\": \"21.18.3\"}, {\"status\": \"affected\", \"version\": \"21.14.b19\"}, {\"status\": \"affected\", \"version\": \"21.19.2\"}, {\"status\": \"affected\", \"version\": \"21.15.37\"}, {\"status\": \"affected\", \"version\": \"21.17.7\"}, {\"status\": \"affected\", \"version\": \"21.14.20\"}, {\"status\": \"affected\", \"version\": \"21.16.c12\"}, {\"status\": \"affected\", \"version\": \"21.18.4\"}, {\"status\": \"affected\", \"version\": \"21.19.3\"}, {\"status\": \"affected\", \"version\": \"21.13.20\"}, {\"status\": \"affected\", \"version\": \"21.15.40\"}, {\"status\": \"affected\", \"version\": \"21.14.b20\"}, {\"status\": \"affected\", \"version\": \"21.16.4\"}, {\"status\": \"affected\", \"version\": \"21.18.5\"}, {\"status\": \"affected\", \"version\": \"21.14.b21\"}, {\"status\": \"affected\", \"version\": \"21.16.c13\"}, {\"status\": \"affected\", \"version\": \"21.11.14\"}, {\"status\": \"affected\", \"version\": \"21.12.18\"}, {\"status\": \"affected\", \"version\": \"21.20.SV1\"}, {\"status\": \"affected\", \"version\": \"21.20.0\"}, {\"status\": \"affected\", \"version\": \"21.15.41\"}, {\"status\": \"affected\", \"version\": \"21.20.SV2\"}, {\"status\": \"affected\", \"version\": \"21.17.8\"}, {\"status\": \"affected\", \"version\": \"21.20.1\"}, {\"status\": \"affected\", \"version\": \"21.20.SV3\"}, {\"status\": \"affected\", \"version\": \"21.16.5\"}, {\"status\": \"affected\", \"version\": \"21.20.SV5\"}, {\"status\": \"affected\", \"version\": \"21.15.43\"}, {\"status\": \"affected\", \"version\": \"21.19.4\"}, {\"status\": \"affected\", \"version\": \"21.18.6\"}, {\"status\": \"affected\", \"version\": \"21.15.45\"}, {\"status\": \"affected\", \"version\": \"21.20.2\"}, {\"status\": \"affected\", \"version\": \"21.16.c14\"}, {\"status\": \"affected\", \"version\": \"21.17.9\"}, {\"status\": \"affected\", \"version\": \"21.11.15\"}, {\"status\": \"affected\", \"version\": \"21.14.22\"}, {\"status\": \"affected\", \"version\": \"21.20.3\"}, {\"status\": \"affected\", \"version\": \"21.15.46\"}, {\"status\": \"affected\", \"version\": \"21.18.7\"}, {\"status\": \"affected\", \"version\": \"21.19.n3\"}, {\"status\": \"affected\", \"version\": \"21.15.47\"}, {\"status\": \"affected\", \"version\": \"21.15.48\"}, {\"status\": \"affected\", \"version\": \"21.19.5\"}, {\"status\": \"affected\", \"version\": \"21.17.10\"}, {\"status\": \"affected\", \"version\": \"21.18.8\"}, {\"status\": \"affected\", \"version\": \"21.16.6\"}, {\"status\": \"affected\", \"version\": \"21.12.19\"}, {\"status\": \"affected\", \"version\": \"21.13.21\"}, {\"status\": \"affected\", \"version\": \"21.20.4\"}, {\"status\": \"affected\", \"version\": \"21.18.9\"}, {\"status\": \"affected\", \"version\": \"21.19.n4\"}, {\"status\": \"affected\", \"version\": \"21.17.11\"}, {\"status\": \"affected\", \"version\": \"21.18.11\"}, {\"status\": \"affected\", \"version\": \"21.19.6\"}, {\"status\": \"affected\", \"version\": \"21.16.c15\"}, {\"status\": \"affected\", \"version\": \"21.16.7\"}, {\"status\": \"affected\", \"version\": \"21.17.12\"}, {\"status\": \"affected\", \"version\": \"21.21.0\"}, {\"status\": \"affected\", \"version\": \"21.17.13\"}, {\"status\": \"affected\", \"version\": \"21.11.16\"}, {\"status\": \"affected\", \"version\": \"21.12.20\"}, {\"status\": \"affected\", \"version\": \"21.18.12\"}, {\"status\": \"affected\", \"version\": \"21.12.21\"}, {\"status\": \"affected\", \"version\": \"21.14.b22\"}, {\"status\": \"affected\", \"version\": \"21.19.7\"}, {\"status\": \"affected\", \"version\": \"21.20.6\"}, {\"status\": \"affected\", \"version\": \"21.18.13\"}, {\"status\": \"affected\", \"version\": \"21.19.n5\"}, {\"status\": \"affected\", \"version\": \"21.18.14\"}, {\"status\": \"affected\", \"version\": \"21.20.7\"}, {\"status\": \"affected\", \"version\": \"21.11.17\"}, {\"status\": \"affected\", \"version\": \"21.17.14\"}, {\"status\": \"affected\", \"version\": \"21.19.8\"}, {\"status\": \"affected\", \"version\": \"21.20.8\"}, {\"status\": \"affected\", \"version\": \"21.19.9\"}, {\"status\": \"affected\", \"version\": \"21.17.15\"}, {\"status\": \"affected\", \"version\": \"21.20.9\"}, {\"status\": \"affected\", \"version\": \"21.18.15\"}, {\"status\": \"affected\", \"version\": \"21.15.51\"}, {\"status\": \"affected\", \"version\": \"21.14.23\"}, {\"status\": \"affected\", \"version\": \"21.19.10\"}, {\"status\": \"affected\", \"version\": \"21.20.k6\"}, {\"status\": \"affected\", \"version\": \"21.11.18\"}, {\"status\": \"affected\", \"version\": \"21.19.n6\"}, {\"status\": \"affected\", \"version\": \"21.16.8\"}, {\"status\": \"affected\", \"version\": \"21.15.52\"}, {\"status\": \"affected\", \"version\": \"21.17.16\"}, {\"status\": \"affected\", \"version\": \"21.20.10\"}, {\"status\": \"affected\", \"version\": \"21.15.53\"}, {\"status\": \"affected\", \"version\": \"21.11.19\"}, {\"status\": \"affected\", \"version\": \"21.20.k7\"}, {\"status\": \"affected\", \"version\": \"21.15.54\"}, {\"status\": \"affected\", \"version\": \"21.20.11\"}, {\"status\": \"affected\", \"version\": \"21.20.u8\"}, {\"status\": \"affected\", \"version\": \"21.21.1\"}, {\"status\": \"affected\", \"version\": \"21.17.17\"}, {\"status\": \"affected\", \"version\": \"21.15.55\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco\\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS\", \"name\": \"cisco-sa-staros-ipsecmgr-dos-3gkHXwvS\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the October 2021 release of the Cisco\u0026nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see \u003ca href=\\\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773\\\"\u003eCisco\u0026nbsp;Event Response: October 2021 Cisco\u0026nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the September 2021 release of the Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see \u003ca href=\\\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74637\\\"\u003eCisco\u0026nbsp;Event Response: September 2021 Cisco\u0026nbsp;IOS XR Software Security Advisory Bundled Publication\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the ipsecmgr process of Cisco\u0026nbsp;ASR 5000 Series Software (StarOS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\\r\\nThis vulnerability is due to insufficient validation of incoming Internet Key Exchange Version 2 (IKEv2) packets. An attacker could exploit this vulnerability by sending specifically malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause the ipsecmgr process to restart, which would disrupt ongoing IKE negotiations and result in a temporary DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-119\", \"description\": \"Improper Restriction of Operations within the Bounds of a Memory Buffer\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-11-18T15:35:11.060Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-1424\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-18T16:18:16.475Z\", \"dateReserved\": \"2020-11-13T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-11-18T15:35:11.060Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…