Lucene search

K
cve[email protected]CVE-2019-1750
HistoryMar 28, 2019 - 12:29 a.m.

CVE-2019-1750

2019-03-2800:29:00
CWE-20
CWE-388
web.nvd.nist.gov
44
cve-2019-1750
cisco
catalyst 4500
easy vss
reload
denial of service
dos
security vulnerability
nvd

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.2%

A vulnerability in the Easy Virtual Switching System (VSS) of Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an unauthenticated, adjacent attacker to cause the switches to reload. The vulnerability is due to incomplete error handling when processing Cisco Discovery Protocol (CDP) packets used with the Easy Virtual Switching System. An attacker could exploit this vulnerability by sending a specially crafted CDP packet. An exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Affected configurations

NVD
Node
ciscoios_xeMatch3.6.0ae
OR
ciscoios_xeMatch3.6.0be
OR
ciscoios_xeMatch3.6.0e
OR
ciscoios_xeMatch3.6.1e
OR
ciscoios_xeMatch3.6.2ae
OR
ciscoios_xeMatch3.6.2e
OR
ciscoios_xeMatch3.6.3e
OR
ciscoios_xeMatch3.6.4e
OR
ciscoios_xeMatch3.6.5ae
OR
ciscoios_xeMatch3.6.5be
OR
ciscoios_xeMatch3.6.5e
OR
ciscoios_xeMatch3.6.6e
OR
ciscoios_xeMatch3.6.7ae
OR
ciscoios_xeMatch3.6.7be
OR
ciscoios_xeMatch3.6.7e
OR
ciscoios_xeMatch3.6.8e
OR
ciscoios_xeMatch3.6.9e
OR
ciscoios_xeMatch3.6.10e
OR
ciscoios_xeMatch3.7.0e
OR
ciscoios_xeMatch3.7.1e
OR
ciscoios_xeMatch3.7.2e
OR
ciscoios_xeMatch3.7.3e
OR
ciscoios_xeMatch3.8.0e
OR
ciscoios_xeMatch3.8.1e
OR
ciscoios_xeMatch3.8.2e
OR
ciscoios_xeMatch3.8.3e
OR
ciscoios_xeMatch3.8.4e
OR
ciscoios_xeMatch3.8.5ae
OR
ciscoios_xeMatch3.8.5e
OR
ciscoios_xeMatch3.8.6e
OR
ciscoios_xeMatch3.8.7e
OR
ciscoios_xeMatch3.9.0e
OR
ciscoios_xeMatch3.9.1e
OR
ciscoios_xeMatch3.9.2be
OR
ciscoios_xeMatch3.9.2e
OR
ciscoios_xeMatch3.10.0ce
OR
ciscoios_xeMatch3.10.0e
OR
ciscoios_xeMatch3.10.1ae
OR
ciscoios_xeMatch3.10.1e
OR
ciscoios_xeMatch3.10.1se
OR
ciscoios_xeMatch3.10.2e
OR
ciscoios_xeMatch16.9.2h

CNA Affected

[
  {
    "product": "Cisco IOS XE Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "3.6.0E"
      },
      {
        "status": "affected",
        "version": "3.6.1E"
      },
      {
        "status": "affected",
        "version": "3.6.0aE"
      },
      {
        "status": "affected",
        "version": "3.6.0bE"
      },
      {
        "status": "affected",
        "version": "3.6.2aE"
      },
      {
        "status": "affected",
        "version": "3.6.2E"
      },
      {
        "status": "affected",
        "version": "3.6.3E"
      },
      {
        "status": "affected",
        "version": "3.6.4E"
      },
      {
        "status": "affected",
        "version": "3.6.5E"
      },
      {
        "status": "affected",
        "version": "3.6.6E"
      },
      {
        "status": "affected",
        "version": "3.6.5aE"
      },
      {
        "status": "affected",
        "version": "3.6.5bE"
      },
      {
        "status": "affected",
        "version": "3.6.7E"
      },
      {
        "status": "affected",
        "version": "3.6.8E"
      },
      {
        "status": "affected",
        "version": "3.6.7aE"
      },
      {
        "status": "affected",
        "version": "3.6.7bE"
      },
      {
        "status": "affected",
        "version": "3.6.9E"
      },
      {
        "status": "affected",
        "version": "3.6.10E"
      },
      {
        "status": "affected",
        "version": "3.7.0E"
      },
      {
        "status": "affected",
        "version": "3.7.1E"
      },
      {
        "status": "affected",
        "version": "3.7.2E"
      },
      {
        "status": "affected",
        "version": "3.7.3E"
      },
      {
        "status": "affected",
        "version": "3.8.0E"
      },
      {
        "status": "affected",
        "version": "3.8.1E"
      },
      {
        "status": "affected",
        "version": "3.8.2E"
      },
      {
        "status": "affected",
        "version": "3.8.3E"
      },
      {
        "status": "affected",
        "version": "3.8.4E"
      },
      {
        "status": "affected",
        "version": "3.8.5E"
      },
      {
        "status": "affected",
        "version": "3.8.5aE"
      },
      {
        "status": "affected",
        "version": "3.8.6E"
      },
      {
        "status": "affected",
        "version": "3.8.7E"
      },
      {
        "status": "affected",
        "version": "3.9.0E"
      },
      {
        "status": "affected",
        "version": "3.9.1E"
      },
      {
        "status": "affected",
        "version": "3.9.2E"
      },
      {
        "status": "affected",
        "version": "3.9.2bE"
      },
      {
        "status": "affected",
        "version": "16.9.2h"
      },
      {
        "status": "affected",
        "version": "3.10.0E"
      },
      {
        "status": "affected",
        "version": "3.10.1E"
      },
      {
        "status": "affected",
        "version": "3.10.0cE"
      },
      {
        "status": "affected",
        "version": "3.10.2E"
      },
      {
        "status": "affected",
        "version": "3.10.1aE"
      },
      {
        "status": "affected",
        "version": "3.10.1sE"
      }
    ]
  }
]

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.2%

Related for CVE-2019-1750