cve-2016-6455
Vulnerability from cvelistv5
Published
2016-11-03 21:00
Modified
2024-08-06 01:29
Severity ?
Summary
A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:29:20.263Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1037186",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037186"
          },
          {
            "name": "94071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94071"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco StarOS 18.x through 21.x",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco StarOS 18.x through 21.x"
            }
          ]
        }
      ],
      "datePublic": "2016-11-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "unspecified",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1037186",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037186"
        },
        {
          "name": "94071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94071"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2016-6455",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco StarOS 18.x through 21.x",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco StarOS 18.x through 21.x"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "unspecified"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1037186",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037186"
            },
            {
              "name": "94071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94071"
            },
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2016-6455",
    "datePublished": "2016-11-03T21:00:00",
    "dateReserved": "2016-07-26T00:00:00",
    "dateUpdated": "2024-08-06T01:29:20.263Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FA3A1A8-8887-425E-B69E-54C7541087B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.0.0.57828:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE69A4E1-0E64-4C80-83B9-2595AD786628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.0.0.59167:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EA80B89-0EF8-4CD6-AFE8-ECEED1EC4CB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.0.0.59211:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15DC3259-D652-48D4-B702-876A0118678F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.0.l0.59219:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CAB002D-F6FC-4CF6-BAC8-D004196FE8EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9391685F-D6CB-4C0C-AA05-B18FDC72956F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.1.0.59776:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8324B02-1572-4AF2-8ECC-4EF0A4F7E54F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.1.0.59780:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"252F8DBD-D534-42DD-8453-5347FF7A4C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.1_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3623A408-299E-4044-B64A-F250AFDFE1E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCDC5CFA-9557-4EC0-815B-E9357469A77C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.3_base:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E527CF15-AEF3-4D9C-840D-77E7126FA2E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:18.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C64A96-25D5-4D54-9C2C-EBD1DEE1D858\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"903698E4-09B3-4D2D-B32B-BBC93BA9D112\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.0.m0.60737:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CC868B9-5620-4C27-BE41-1159BAB9A588\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.0.m0.60828:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E781AA0-392F-41C1-960D-E07981B34CB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.0.m0.61045:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E331E868-4E6C-4AD8-9ECE-346C6901816A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"393BD120-C307-49C2-92FB-64383F79EA5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.1.0.61559:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"430419D4-5184-48CC-8DDB-2E1BDDCAE9E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"322B6E97-DF1F-45D3-8935-2FF982E19EF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:19.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78E5CBAC-6114-4D07-ADBB-50C7741876D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:asr_5000_software:20.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19EAF4FE-F46A-4801-B7C1-F1372107A5A5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"301681DF-2A9E-4A91-9918-4A46153ADC01\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el Slowpath de StarOS para routers Cisco ASR 5500 Series con Data Processing Card 2 (DPC2) podr\\u00edan permitir a un atacante remoto no autenticado provocar a un subconjunto de las sesiones de suscripci\\u00f3n para ser desconectadas, resultando en una condici\\u00f3n parcial de denegaci\\u00f3n de servicio (DoS). Esta vulnerabilidad afecta a dispositivos Cisco ASR 5500 con Data Processing Card 2 (DPC2) ejecutando StarOS 18.0 o versiones posteriores. M\\u00e1s informaci\\u00f3n: CSCvb12081. Lanzamientos afectados conocidos: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Lanzamientos conocidos solucionados: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.\"}]",
      "id": "CVE-2016-6455",
      "lastModified": "2024-11-21T02:56:10.037",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2016-11-03T21:59:10.967",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/94071\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id/1037186\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/94071\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1037186\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-6455\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2016-11-03T21:59:10.967\",\"lastModified\":\"2024-11-21T02:56:10.037\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el Slowpath de StarOS para routers Cisco ASR 5500 Series con Data Processing Card 2 (DPC2) podr\u00edan permitir a un atacante remoto no autenticado provocar a un subconjunto de las sesiones de suscripci\u00f3n para ser desconectadas, resultando en una condici\u00f3n parcial de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad afecta a dispositivos Cisco ASR 5500 con Data Processing Card 2 (DPC2) ejecutando StarOS 18.0 o versiones posteriores. M\u00e1s informaci\u00f3n: CSCvb12081. Lanzamientos afectados conocidos: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Lanzamientos conocidos solucionados: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA3A1A8-8887-425E-B69E-54C7541087B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.0.0.57828:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE69A4E1-0E64-4C80-83B9-2595AD786628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.0.0.59167:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA80B89-0EF8-4CD6-AFE8-ECEED1EC4CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.0.0.59211:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DC3259-D652-48D4-B702-876A0118678F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.0.l0.59219:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CAB002D-F6FC-4CF6-BAC8-D004196FE8EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9391685F-D6CB-4C0C-AA05-B18FDC72956F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.1.0.59776:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8324B02-1572-4AF2-8ECC-4EF0A4F7E54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.1.0.59780:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"252F8DBD-D534-42DD-8453-5347FF7A4C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3623A408-299E-4044-B64A-F250AFDFE1E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDC5CFA-9557-4EC0-815B-E9357469A77C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.3_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E527CF15-AEF3-4D9C-840D-77E7126FA2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:18.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C64A96-25D5-4D54-9C2C-EBD1DEE1D858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903698E4-09B3-4D2D-B32B-BBC93BA9D112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.0.m0.60737:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC868B9-5620-4C27-BE41-1159BAB9A588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.0.m0.60828:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E781AA0-392F-41C1-960D-E07981B34CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.0.m0.61045:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E331E868-4E6C-4AD8-9ECE-346C6901816A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"393BD120-C307-49C2-92FB-64383F79EA5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.1.0.61559:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430419D4-5184-48CC-8DDB-2E1BDDCAE9E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"322B6E97-DF1F-45D3-8935-2FF982E19EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:19.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E5CBAC-6114-4D07-ADBB-50C7741876D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:asr_5000_software:20.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19EAF4FE-F46A-4801-B7C1-F1372107A5A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"301681DF-2A9E-4A91-9918-4A46153ADC01\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/94071\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1037186\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1037186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.