FKIE_CVE-2016-6399

Vulnerability from fkie_nvd - Published: 2016-09-12 10:59 - Updated: 2025-04-12 10:46
Summary
Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317.
Impacted products
Vendor Product Version
cisco ace_application_control_engine_module_a1 7a
cisco ace_application_control_engine_module_a1 7b
cisco ace_application_control_engine_module_a1 8.0
cisco ace_application_control_engine_module_a1 8.0a
cisco ace_application_control_engine_module_a3 1.0
cisco ace_application_control_engine_module_a3 2.0
cisco ace_application_control_engine_module_a3 2.2
cisco ace_application_control_engine_module_a3 2.3
cisco ace_application_control_engine_module_a3 2.4
cisco ace_application_control_engine_module_a3 2.5
cisco ace_application_control_engine_module_a3 2.6
cisco ace_application_control_engine_module_a3 2.7
cisco ace_application_control_engine_module_a4 1.0
cisco ace_application_control_engine_module_a4 1.1
cisco ace_application_control_engine_module_a4 2.0
cisco ace_application_control_engine_module_a4 2.1a
cisco ace_application_control_engine_module_a4 2.2
cisco ace_application_control_engine_module_a4 2.3
cisco ace_application_control_engine_module_a5 1.0
cisco ace_application_control_engine_module_a5 1.1
cisco ace_application_control_engine_module_a5 1.2
cisco ace_application_control_engine_module_a5 2.0
cisco ace_application_control_engine_module_a5 2.1
cisco ace_application_control_engine_module_a5 2.1e
cisco ace_application_control_engine_module_a5 3.0
cisco ace_application_control_engine_module_a5 3.1a
cisco ace_application_control_engine_module_a5 3.1b
cisco ace_application_control_engine_module_a5 3.2
cisco ace_application_control_engine_module_a5 3.3
cisco ace_4700_series_application_control_engine_appliance a5\(1.0\)
cisco ace_4700_series_application_control_engine_appliance a5\(1.1\)
cisco ace_4700_series_application_control_engine_appliance a5\(1.2\)
cisco ace_4700_series_application_control_engine_appliance a5\(2.0\)
cisco ace_4700_series_application_control_engine_appliance a5\(2.1\)
cisco ace_4700_series_application_control_engine_appliance a5\(2.1e\)
cisco ace_4700_series_application_control_engine_appliance a5\(3.0\)
cisco ace_4700_series_application_control_engine_appliance a5_base
cisco ace_4700_series_application_control_engine_appliance_a1 7
cisco ace_4700_series_application_control_engine_appliance_a1 7a
cisco ace_4700_series_application_control_engine_appliance_a1 7b
cisco ace_4700_series_application_control_engine_appliance_a1 8.0
cisco ace_4700_series_application_control_engine_appliance_a1 8.0a
cisco ace_4700_series_application_control_engine_appliance_a3 1.0
cisco ace_4700_series_application_control_engine_appliance_a3 2.0
cisco ace_4700_series_application_control_engine_appliance_a3 2.2
cisco ace_4700_series_application_control_engine_appliance_a3 2.3
cisco ace_4700_series_application_control_engine_appliance_a3 2.4
cisco ace_4700_series_application_control_engine_appliance_a3 2.5
cisco ace_4700_series_application_control_engine_appliance_a3 2.6
cisco ace_4700_series_application_control_engine_appliance_a3 2.7
cisco ace_4700_series_application_control_engine_appliance_a4 1.0
cisco ace_4700_series_application_control_engine_appliance_a4 1.1
cisco ace_4700_series_application_control_engine_appliance_a4 2.0
cisco ace_4700_series_application_control_engine_appliance_a4 2.1a
cisco ace_4700_series_application_control_engine_appliance_a4 2.2
cisco ace_4700_series_application_control_engine_appliance_a4 2.3
cisco ace_4700_series_application_control_engine_appliance_a5 3.1a
cisco ace_4700_series_application_control_engine_appliance_a5 3.1b
cisco ace_4700_series_application_control_engine_appliance_a5 3.2
cisco ace_4700_series_application_control_engine_appliance_a5 3.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "36B95E42-77DA-4AFB-A159-7809CD95D24B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:7b:*:*:*:*:*:*:*",
              "matchCriteriaId": "968D39EB-5481-4698-B3A9-C2E90BFD88FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE5326B-B86B-434B-B86A-8703CD1CA872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:8.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0625AAB8-ADA5-4495-8A01-87DAE0C573B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3583B054-0D5D-41AD-8508-0E5D87491045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7170B3-B3DA-4667-8ADE-09EA0D17C37F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE45DC-11D4-429C-890F-F9E117930AF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "680510A7-CF93-4C86-A556-F0C9511AF3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C10C1C9-356A-4D47-BB4B-58AD940199E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "521441F7-8388-4F58-A262-6B8057209FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "09CB323B-7913-4B2F-AE69-95D34ED6A83F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7722C303-3AE4-4078-947B-7A648FC5477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0786FAF6-44D0-4F2E-952E-2CE4CEE30A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAB9C402-2A7B-4701-A260-46C6D0E63050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F40CA11-A160-4307-9305-28DA4938945B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "430CA0DA-0402-4FFB-9170-7F08DE70C36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BEDD60-ACF6-441E-85B0-8E93C6F5CE41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF39113-6665-484B-AA2E-2FB49BCDEC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AABE9B-4A09-477F-A139-7CB40C14AA55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0FF5BA5-AC61-4244-A7C2-F9811AD13C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F571AD7F-14B9-498C-8F06-D1DF61B6EF35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B2425F-7EFA-4599-8A7E-2B0454A58077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A6203D-DF5E-46B9-BFCD-D41FC729193F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB594F8-3673-42E8-8E8B-996DEA75E815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFB0D00-A082-4930-9D6D-CFB1CDB632EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E975AAC-A44A-4042-80F5-959989B785AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "46FEAE36-71F8-40C9-954C-42B57CC1BE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAB49D71-F1FD-43E3-A245-50E4A2F62606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "428DCAD9-B5AD-45DC-91D7-27535F286957",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(1.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2091508E-84D9-496B-B4E1-9BAC927F982A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(1.1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB7E381-E849-42F6-8201-E32D1747E06E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(1.2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F266A5E5-9455-4EC5-BBF2-AAA2CA2A60AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(2.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A23695F0-B2FE-46F1-9328-56B1EF00A112",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(2.1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D4239B16-7380-48E4-992D-479351DF1AC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(2.1e\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E476F81E-7F90-442A-8FF1-45FCFCF096C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(3.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6351F63A-D5B2-4EE3-AC7D-3CDA0A217E5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5_base:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE7CF67-7B2F-40A1-8F52-639483094568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED884ACC-89C8-461D-A238-36316F507441",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE014E6-0224-402B-AFF0-7B7FA67382A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C8FF44C-CC30-43F7-832E-C88390482CA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7DF627-2A9D-42CD-9929-26A32E687F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:8.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7B42BF-80B8-40AB-BAF9-9E73216F8524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE68EF35-7CD7-49A3-A143-4C47012C012D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAB9218-3909-4B08-92EC-8431FC5C8D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F2BEAC-D53A-4630-8530-ED24ACC820A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "659F4ACE-9564-45AC-B85D-D0625853FFA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2539AF6-E914-4279-A54D-2E7652AFD7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2917FB57-2BBF-4A77-AEE7-C6D660D44A20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1863CF65-736C-44BD-80A2-B9DE33A4797A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABB8883-0476-4E83-9F75-40ABFF806786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F8264DF-8037-4A4C-8C08-E332E9649347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4DC4A0-44E9-41C1-99A7-82499AC8577B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "38482D95-999B-4A40-A37A-71150E48ED50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "90762C72-8DA2-446C-B3A8-DC9DCB33DD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6BAEB1-8271-475F-ADD0-D3EDF0773DF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CDF5356-429E-4CD5-8031-5E52CF3FF118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "39AB46CA-9775-4EC8-8419-13B0224251BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50A418B-1AC6-40BA-B80B-29313C95F030",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C673B2B9-2A26-47C2-B553-2AE8A41916AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD80BBE-813F-4B2E-B05D-3A96686FA8D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco ACE30 Application Control Engine Module hasta la versi\u00f3n A5 3.3 y ACE 4700 Application Control Engine hasta la versi\u00f3n A5 3.3 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes (1) SSL o (2) TLS manipulados, vulnerabilidad tambi\u00e9n conocida como Bug ID CSCvb16317."
    }
  ],
  "id": "CVE-2016-6399",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-09-12T10:59:11.507",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/92867"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id/1036748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/92867"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1036748"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…