CVE-2019-1751 (GCVE-0-2019-1751)

Vulnerability from cvelistv5 – Published: 2019-03-28 00:00 – Updated: 2024-11-19 19:13
VLAI?
Summary
A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/107601 vdb-entryx_refsource_BID
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.306Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190327 Cisco IOS Software NAT64 Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64"
          },
          {
            "name": "107601",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/107601"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1751",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T17:25:00.595910Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-19T19:13:10.677Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "15.x"
            }
          ]
        }
      ],
      "datePublic": "2019-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-28T09:06:08",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190327 Cisco IOS Software NAT64 Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64"
        },
        {
          "name": "107601",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/107601"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190327-nat64",
        "defect": [
          [
            "CSCvk61580"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS Software NAT64 Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-03-27T16:00:00-0700",
          "ID": "CVE-2019-1751",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS Software NAT64 Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "15.x"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.6",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190327 Cisco IOS Software NAT64 Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64"
            },
            {
              "name": "107601",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/107601"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190327-nat64",
          "defect": [
            [
              "CSCvk61580"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1751",
    "datePublished": "2019-03-28T00:00:16.397275Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-19T19:13:10.677Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)cg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C13F2837-174B-4437-BF3F-CB6BFBF8F64D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1EE552E-226C-46DE-9861-CB148AD8FB44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAF02C8E-9BB2-4DC2-8BF1-932835191F09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5AC88EB-7A67-4CDE-9C69-94734966E677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74E1226B-46CF-4C82-911A-86C818A75DFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"100DA24F-464E-4273-83DF-6428D0ED6641\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"063C0C47-25EB-4AA4-9332-8E43CD60FF39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6004A94-FF96-4A34-B3CC-D4B4E555CFB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02866AED-A1B4-4D89-A11F-27089EF935BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C85BAAF-819B-40E7-9099-04AA8D9AB114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED684DB4-527A-4268-B197-4719B0178429\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88F41406-0F55-4D74-A4F6-4ABD5A803907\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7082C083-7517-4CD4-BF95-CC7AF08D4053\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"370EF3DC-151F-4724-A026-3AD8ED6D801C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B8FB86F-2A89-413B-BED7-97E3D392804E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"005EAD76-34BE-4E3F-8840-23F613661FE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2595B3E3-7FD4-4EFF-98A2-89156A657A0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB998A1F-BAEA-4B8F-BE49-1C282ED3952E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m7a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A55379B7-2787-4BE6-8960-204C074F4CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AABDAB3-6329-48CF-BB49-DA2046AB9048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C96E41FF-DD4B-4D55-8C96-248C9A15226B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64F7ACB5-4FE5-4B07-8B4D-28DF8D655199\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59F21FEC-A536-45CB-9AE5-61CE45EAD1B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0340EC20-7099-4F13-8DE6-84475B2A52CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6994F100-864F-4512-9141-F7D1050F9DD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC0CC364-FF3A-4FB3-8004-6628400BC7DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67A1BC08-28AF-4583-BE21-0D85CA2D7B6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A4E00DF-60FD-48F2-A69A-D709A5657F6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F5D3761-16C8-413A-89AD-C076B9B92FF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F690BEC9-FAE9-4C02-9993-34BF14FA99EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0B8565B-3EE6-48DC-AE92-9F16AFFC509C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)xb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D604189-E382-47B3-B9D3-A6D2EA3B2C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"716EC9AA-0569-4FA7-A244-1A14FA15C5AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39166A66-859D-43A7-9947-3F3C32FBFAAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"097D1950-6159-45A2-8653-D3F90044D0C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F421AC3C-B0BC-4177-ACDB-87792C1636EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA965B88-3464-4320-B9C4-594C49C9C0F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09CD336D-1110-4B0C-B8D4-7C96293CBADE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C427BA8-3A8C-4934-997B-6DDF9CEB96AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90950C85-D631-4F60-AB3E-3ED1D74D56B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD79CA0D-7D90-4955-969A-C25873B0B9D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7809674-4738-463E-B522-FC6C419E2A09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBF3D5CF-5352-4CEA-865C-62CBB79778FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFD51F00-C219-439F-918E-9AF20A6E053A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57BCB671-7ED0-43D5-894F-8B3DBF44E68E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4802BC7-F326-4F6E-9C74-04032FF35FEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEDE3BCF-B518-47B0-BD3B-0B75515771E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E25B3DC-B9A7-4DFC-8566-3F790F460DDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"679DCA8C-F64B-4716-BCC9-9C461A89CB29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF662E36-0831-4892-850F-844B0E0B54DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E71F49D-E405-4AB4-9188-DA7B338DFD7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"204B0A52-F6AB-406B-B46D-E92F2D7D87F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BBF8B70-DFBE-4F6E-83F0-171F03E97606\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA55D660-66C6-4278-8C27-25DB2712CC1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5609B342-D98E-4850-A0FE-810699A80A1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8320F23D-F6BE-405B-B645-1CEB984E8267\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7C5C705-6A8C-4834-9D24-CFE26A232C15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691BA27E-77AB-4A30-916D-3BB916B05298\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC270E40-CABA-44B4-B4DD-E9C47A97770B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC1DB8C1-7F7D-4562-A317-87E925CAD524\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A1887D9-E339-4DC6-BE24-A5FF15438B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB2645F-C3BF-458F-9D07-6D66E1953730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"686FD45C-7722-4D98-A6D7-C36CAC56A4AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"871E33AC-B469-47BA-9317-DC9E3E9BF5C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C8A00BF-4522-467B-A96E-5C33623DCA2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A434E7-B27C-4663-BE83-39A650D22D26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47C106CF-CBD3-4630-8E77-EDB1643F97E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1DB7943-5CE1-44F6-B093-5EA65BF71A59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64404B00-4956-47B8-ACDB-88E365E97212\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A58C01B-459E-432F-A49F-68EC45EE6E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4125EE35-ED52-4350-A4CE-E90EA8ED6BAD\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en las funciones NAT64 (Network Address Translation 64) del software Cisco IOS podr\\u00eda permitir que un atacante remoto no autenticado provoque un \\\"wedge\\\" en la cola de la interfaz o la recarga del dispositivo. La vulnerabilidad se debe a la gesti\\u00f3n incorrecta de ciertas transmisiones de paquetes IPv4 que se env\\u00edan a trav\\u00e9s del dispositivo. Un atacante podr\\u00eda explotar esta vulnerabilidad enviando transmisiones de paquetes IPv4 a trav\\u00e9s del dispositivo. Su explotaci\\u00f3n podr\\u00eda permitir que el atacante consiga un \\\"wedge\\\" en la cola de la interfaz o la recarga del dispositivo, provocando una denegaci\\u00f3n de servicio (DoS).\"}]",
      "id": "CVE-2019-1751",
      "lastModified": "2024-11-21T04:37:16.983",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 8.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-03-28T00:29:00.780",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/107601\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107601\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-1751\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2019-03-28T00:29:00.780\",\"lastModified\":\"2024-11-21T04:37:16.983\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en las funciones NAT64 (Network Address Translation 64) del software Cisco IOS podr\u00eda permitir que un atacante remoto no autenticado provoque un \\\"wedge\\\" en la cola de la interfaz o la recarga del dispositivo. La vulnerabilidad se debe a la gesti\u00f3n incorrecta de ciertas transmisiones de paquetes IPv4 que se env\u00edan a trav\u00e9s del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad enviando transmisiones de paquetes IPv4 a trav\u00e9s del dispositivo. Su explotaci\u00f3n podr\u00eda permitir que el atacante consiga un \\\"wedge\\\" en la cola de la interfaz o la recarga del dispositivo, provocando una denegaci\u00f3n de servicio (DoS).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)cg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C13F2837-174B-4437-BF3F-CB6BFBF8F64D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EE552E-226C-46DE-9861-CB148AD8FB44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF02C8E-9BB2-4DC2-8BF1-932835191F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5AC88EB-7A67-4CDE-9C69-94734966E677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E1226B-46CF-4C82-911A-86C818A75DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"100DA24F-464E-4273-83DF-6428D0ED6641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063C0C47-25EB-4AA4-9332-8E43CD60FF39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6004A94-FF96-4A34-B3CC-D4B4E555CFB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02866AED-A1B4-4D89-A11F-27089EF935BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C85BAAF-819B-40E7-9099-04AA8D9AB114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED684DB4-527A-4268-B197-4719B0178429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F41406-0F55-4D74-A4F6-4ABD5A803907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7082C083-7517-4CD4-BF95-CC7AF08D4053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370EF3DC-151F-4724-A026-3AD8ED6D801C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8FB86F-2A89-413B-BED7-97E3D392804E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005EAD76-34BE-4E3F-8840-23F613661FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595B3E3-7FD4-4EFF-98A2-89156A657A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB998A1F-BAEA-4B8F-BE49-1C282ED3952E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A55379B7-2787-4BE6-8960-204C074F4CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AABDAB3-6329-48CF-BB49-DA2046AB9048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C96E41FF-DD4B-4D55-8C96-248C9A15226B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F7ACB5-4FE5-4B07-8B4D-28DF8D655199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F21FEC-A536-45CB-9AE5-61CE45EAD1B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0340EC20-7099-4F13-8DE6-84475B2A52CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6994F100-864F-4512-9141-F7D1050F9DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0CC364-FF3A-4FB3-8004-6628400BC7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A1BC08-28AF-4583-BE21-0D85CA2D7B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4E00DF-60FD-48F2-A69A-D709A5657F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5D3761-16C8-413A-89AD-C076B9B92FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F690BEC9-FAE9-4C02-9993-34BF14FA99EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B8565B-3EE6-48DC-AE92-9F16AFFC509C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(2\\\\)xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D604189-E382-47B3-B9D3-A6D2EA3B2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"716EC9AA-0569-4FA7-A244-1A14FA15C5AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39166A66-859D-43A7-9947-3F3C32FBFAAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"097D1950-6159-45A2-8653-D3F90044D0C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F421AC3C-B0BC-4177-ACDB-87792C1636EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA965B88-3464-4320-B9C4-594C49C9C0F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09CD336D-1110-4B0C-B8D4-7C96293CBADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C427BA8-3A8C-4934-997B-6DDF9CEB96AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90950C85-D631-4F60-AB3E-3ED1D74D56B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD79CA0D-7D90-4955-969A-C25873B0B9D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7809674-4738-463E-B522-FC6C419E2A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF3D5CF-5352-4CEA-865C-62CBB79778FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD51F00-C219-439F-918E-9AF20A6E053A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BCB671-7ED0-43D5-894F-8B3DBF44E68E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4802BC7-F326-4F6E-9C74-04032FF35FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)m8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEDE3BCF-B518-47B0-BD3B-0B75515771E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E25B3DC-B9A7-4DFC-8566-3F790F460DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679DCA8C-F64B-4716-BCC9-9C461A89CB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF662E36-0831-4892-850F-844B0E0B54DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E71F49D-E405-4AB4-9188-DA7B338DFD7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(1\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"204B0A52-F6AB-406B-B46D-E92F2D7D87F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBF8B70-DFBE-4F6E-83F0-171F03E97606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA55D660-66C6-4278-8C27-25DB2712CC1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5609B342-D98E-4850-A0FE-810699A80A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8320F23D-F6BE-405B-B645-1CEB984E8267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C5C705-6A8C-4834-9D24-CFE26A232C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691BA27E-77AB-4A30-916D-3BB916B05298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC270E40-CABA-44B4-B4DD-E9C47A97770B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1DB8C1-7F7D-4562-A317-87E925CAD524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1887D9-E339-4DC6-BE24-A5FF15438B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB2645F-C3BF-458F-9D07-6D66E1953730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686FD45C-7722-4D98-A6D7-C36CAC56A4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.6\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871E33AC-B469-47BA-9317-DC9E3E9BF5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8A00BF-4522-467B-A96E-5C33623DCA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A434E7-B27C-4663-BE83-39A650D22D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47C106CF-CBD3-4630-8E77-EDB1643F97E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DB7943-5CE1-44F6-B093-5EA65BF71A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.7\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64404B00-4956-47B8-ACDB-88E365E97212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A58C01B-459E-432F-A49F-68EC45EE6E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.8\\\\(3\\\\)m0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4125EE35-ED52-4350-A4CE-E90EA8ED6BAD\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/107601\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107601\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\", \"name\": \"20190327 Cisco IOS Software NAT64 Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/107601\", \"name\": \"107601\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:28:42.306Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-1751\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-19T17:25:00.595910Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-19T17:25:29.175Z\"}}], \"cna\": {\"title\": \"Cisco IOS Software NAT64 Denial of Service Vulnerability\", \"source\": {\"defect\": [[\"CSCvk61580\"]], \"advisory\": \"cisco-sa-20190327-nat64\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"15.x\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2019-03-27T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\", \"name\": \"20190327 Cisco IOS Software NAT64 Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"http://www.securityfocus.com/bid/107601\", \"name\": \"107601\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2019-03-28T09:06:08\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"8.6\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\"}}, \"source\": {\"defect\": [[\"CSCvk61580\"]], \"advisory\": \"cisco-sa-20190327-nat64\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"15.x\", \"version_affected\": \"=\"}]}, \"product_name\": \"Cisco IOS Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64\", \"name\": \"20190327 Cisco IOS Software NAT64 Denial of Service Vulnerability\", \"refsource\": \"CISCO\"}, {\"url\": \"http://www.securityfocus.com/bid/107601\", \"name\": \"107601\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-1751\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS Software NAT64 Denial of Service Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2019-03-27T16:00:00-0700\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2019-1751\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-19T19:13:10.677Z\", \"dateReserved\": \"2018-12-06T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2019-03-28T00:00:16.397275Z\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…