Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cnvd-2019-14439
Vulnerability from cnvd
Title
Cisco IOS和IOS XE CMP拒绝服务漏洞
Description
Cisco IOS和IOS XE都是美国思科(Cisco)公司的一套为其网络设备开发的操作系统。
Cisco IOS和IOS XE中的Cluster Management Protocol (CMP)处理代码存在输入验证漏洞。攻击者可通过发送恶意的CMP管理数据包利用该漏洞造成交换机崩溃,导致拒绝服务。
Severity
中
VLAI Severity ?
Patch Name
Cisco IOS和IOS XE CMP拒绝服务漏洞的补丁
Patch Description
Cisco IOS和IOS XE都是美国思科(Cisco)公司的一套为其网络设备开发的操作系统。
Cisco IOS和IOS XE中的Cluster Management Protocol (CMP)处理代码存在输入验证漏洞。攻击者可通过发送恶意的CMP管理数据包利用该漏洞造成交换机崩溃,导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos
Reference
https://nvd.nist.gov/vuln/detail/CVE-2019-1746
Impacted products
Name | ['Cisco IOS XE', 'Cisco IOS'] |
---|
{ "bids": { "bid": { "bidNumber": "107612" } }, "cves": { "cve": { "cveNumber": "CVE-2019-1746" } }, "description": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco IOS\u548cIOS XE\u4e2d\u7684Cluster Management Protocol (CMP)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6076\u610f\u7684CMP\u7ba1\u7406\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u4ea4\u6362\u673a\u5d29\u6e83\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "Cisco", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-14439", "openTime": "2019-05-16", "patchDescription": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS\u548cIOS XE\u4e2d\u7684Cluster Management Protocol (CMP)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6076\u610f\u7684CMP\u7ba1\u7406\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u4ea4\u6362\u673a\u5d29\u6e83\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco IOS\u548cIOS XE CMP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Cisco IOS XE", "Cisco IOS" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-1746", "serverity": "\u4e2d", "submitTime": "2019-03-28", "title": "Cisco IOS\u548cIOS XE CMP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
CVE-2019-1746 (GCVE-0-2019-1746)
Vulnerability from cvelistv5
Published
2019-03-27 23:45
Modified
2024-11-21 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS and IOS XE Software |
Version: 3.2.0SG Version: 3.2.1SG Version: 3.2.2SG Version: 3.2.3SG Version: 3.2.4SG Version: 3.2.5SG Version: 3.2.6SG Version: 3.2.7SG Version: 3.2.8SG Version: 3.2.9SG Version: 3.2.10SG Version: 3.2.11SG Version: 3.3.0SG Version: 3.3.2SG Version: 3.3.1SG Version: 3.3.0XO Version: 3.3.1XO Version: 3.3.2XO Version: 3.4.0SG Version: 3.4.2SG Version: 3.4.1SG Version: 3.4.3SG Version: 3.4.4SG Version: 3.4.5SG Version: 3.4.6SG Version: 3.4.7SG Version: 3.4.8SG Version: 3.5.0E Version: 3.5.1E Version: 3.5.2E Version: 3.5.3E Version: 3.10.4S Version: 3.12.0aS Version: 3.6.0E Version: 3.6.1E Version: 3.6.0aE Version: 3.6.0bE Version: 3.6.2aE Version: 3.6.2E Version: 3.6.3E Version: 3.6.4E Version: 3.6.5E Version: 3.6.6E Version: 3.6.5aE Version: 3.6.5bE Version: 3.6.7E Version: 3.6.8E Version: 3.6.7aE Version: 3.6.7bE Version: 3.6.9E Version: 3.6.10E Version: 3.3.0SQ Version: 3.3.1SQ Version: 3.4.0SQ Version: 3.4.1SQ Version: 3.7.0E Version: 3.7.1E Version: 3.7.2E Version: 3.7.3E Version: 3.7.4E Version: 3.7.5E Version: 3.5.0SQ Version: 3.5.1SQ Version: 3.5.2SQ Version: 3.5.3SQ Version: 3.5.4SQ Version: 3.5.5SQ Version: 3.5.6SQ Version: 3.5.7SQ Version: 3.5.8SQ Version: 3.16.1S Version: 3.16.0bS Version: 3.16.10S Version: 3.8.0E Version: 3.8.1E Version: 3.8.2E Version: 3.8.3E Version: 3.8.4E Version: 3.8.5E Version: 3.8.5aE Version: 3.8.6E Version: 3.8.7E Version: 3.9.0E Version: 3.9.1E Version: 3.9.2E Version: 3.9.2bE Version: 16.9.2h Version: 3.10.0E Version: 3.10.1E Version: 3.10.0cE Version: 3.10.1aE Version: 3.10.1sE Version: 16.12.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos" }, { "name": "107612", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107612" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1746", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:59:52.919534Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:41:58.266Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.2.0SG" }, { "status": "affected", "version": "3.2.1SG" }, { "status": "affected", "version": "3.2.2SG" }, { "status": "affected", "version": "3.2.3SG" }, { "status": "affected", "version": "3.2.4SG" }, { "status": "affected", "version": "3.2.5SG" }, { "status": "affected", "version": "3.2.6SG" }, { "status": "affected", "version": "3.2.7SG" }, { "status": "affected", "version": "3.2.8SG" }, { "status": "affected", "version": "3.2.9SG" }, { "status": "affected", "version": "3.2.10SG" }, { "status": "affected", "version": "3.2.11SG" }, { "status": "affected", "version": "3.3.0SG" }, { "status": "affected", "version": "3.3.2SG" }, { "status": "affected", "version": "3.3.1SG" }, { "status": "affected", "version": "3.3.0XO" }, { "status": "affected", "version": "3.3.1XO" }, { "status": "affected", "version": "3.3.2XO" }, { "status": "affected", "version": "3.4.0SG" }, { "status": "affected", "version": "3.4.2SG" }, { "status": "affected", "version": "3.4.1SG" }, { "status": "affected", "version": "3.4.3SG" }, { "status": "affected", "version": "3.4.4SG" }, { "status": "affected", "version": "3.4.5SG" }, { "status": "affected", "version": "3.4.6SG" }, { "status": "affected", "version": "3.4.7SG" }, { "status": "affected", "version": "3.4.8SG" }, { "status": "affected", "version": "3.5.0E" }, { "status": "affected", "version": "3.5.1E" }, { "status": "affected", "version": "3.5.2E" }, { "status": "affected", "version": "3.5.3E" }, { "status": "affected", "version": "3.10.4S" }, { "status": "affected", "version": "3.12.0aS" }, { "status": "affected", "version": "3.6.0E" }, { "status": "affected", "version": "3.6.1E" }, { "status": "affected", "version": "3.6.0aE" }, { "status": "affected", "version": "3.6.0bE" }, { "status": "affected", "version": "3.6.2aE" }, { "status": "affected", "version": "3.6.2E" }, { "status": "affected", "version": "3.6.3E" }, { "status": "affected", "version": "3.6.4E" }, { "status": "affected", "version": "3.6.5E" }, { "status": "affected", "version": "3.6.6E" }, { "status": "affected", "version": "3.6.5aE" }, { "status": "affected", "version": "3.6.5bE" }, { "status": "affected", "version": "3.6.7E" }, { "status": "affected", "version": "3.6.8E" }, { "status": "affected", "version": "3.6.7aE" }, { "status": "affected", "version": "3.6.7bE" }, { "status": "affected", "version": "3.6.9E" }, { "status": "affected", "version": "3.6.10E" }, { "status": "affected", "version": "3.3.0SQ" }, { "status": "affected", "version": "3.3.1SQ" }, { "status": "affected", "version": "3.4.0SQ" }, { "status": "affected", "version": "3.4.1SQ" }, { "status": "affected", "version": "3.7.0E" }, { "status": "affected", "version": "3.7.1E" }, { "status": "affected", "version": "3.7.2E" }, { "status": "affected", "version": "3.7.3E" }, { "status": "affected", "version": "3.7.4E" }, { "status": "affected", "version": "3.7.5E" }, { "status": "affected", "version": "3.5.0SQ" }, { "status": "affected", "version": "3.5.1SQ" }, { "status": "affected", "version": "3.5.2SQ" }, { "status": "affected", "version": "3.5.3SQ" }, { "status": "affected", "version": "3.5.4SQ" }, { "status": "affected", "version": "3.5.5SQ" }, { "status": "affected", "version": "3.5.6SQ" }, { "status": "affected", "version": "3.5.7SQ" }, { "status": "affected", "version": "3.5.8SQ" }, { "status": "affected", "version": "3.16.1S" }, { "status": "affected", "version": "3.16.0bS" }, { "status": "affected", "version": "3.16.10S" }, { "status": "affected", "version": "3.8.0E" }, { "status": "affected", "version": "3.8.1E" }, { "status": "affected", "version": "3.8.2E" }, { "status": "affected", "version": "3.8.3E" }, { "status": "affected", "version": "3.8.4E" }, { "status": "affected", "version": "3.8.5E" }, { "status": "affected", "version": "3.8.5aE" }, { "status": "affected", "version": "3.8.6E" }, { "status": "affected", "version": "3.8.7E" }, { "status": "affected", "version": "3.9.0E" }, { "status": "affected", "version": "3.9.1E" }, { "status": "affected", "version": "3.9.2E" }, { "status": "affected", "version": "3.9.2bE" }, { "status": "affected", "version": "16.9.2h" }, { "status": "affected", "version": "3.10.0E" }, { "status": "affected", "version": "3.10.1E" }, { "status": "affected", "version": "3.10.0cE" }, { "status": "affected", "version": "3.10.1aE" }, { "status": "affected", "version": "3.10.1sE" }, { "status": "affected", "version": "16.12.1" } ] } ], "datePublic": "2019-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T06:06:05", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos" }, { "name": "107612", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107612" } ], "source": { "advisory": "cisco-sa-20190327-cmp-dos", "defect": [ [ "CSCvj25068", "CSCvj25124" ] ], "discovery": "INTERNAL" }, "title": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-27T16:00:00-0700", "ID": "CVE-2019-1746", "STATE": "PUBLIC", "TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.2.0SG" }, { "version_affected": "=", "version_value": "3.2.1SG" }, { "version_affected": "=", "version_value": "3.2.2SG" }, { "version_affected": "=", "version_value": "3.2.3SG" }, { "version_affected": "=", "version_value": "3.2.4SG" }, { "version_affected": "=", "version_value": "3.2.5SG" }, { "version_affected": "=", "version_value": "3.2.6SG" }, { "version_affected": "=", "version_value": "3.2.7SG" }, { "version_affected": "=", "version_value": "3.2.8SG" }, { "version_affected": "=", "version_value": "3.2.9SG" }, { "version_affected": "=", "version_value": "3.2.10SG" }, { "version_affected": "=", "version_value": "3.2.11SG" }, { "version_affected": "=", "version_value": "3.3.0SG" }, { "version_affected": "=", "version_value": "3.3.2SG" }, { "version_affected": "=", "version_value": "3.3.1SG" }, { "version_affected": "=", "version_value": "3.3.0XO" }, { "version_affected": "=", "version_value": "3.3.1XO" }, { "version_affected": "=", "version_value": "3.3.2XO" }, { "version_affected": "=", "version_value": "3.4.0SG" }, { "version_affected": "=", "version_value": "3.4.2SG" }, { "version_affected": "=", "version_value": "3.4.1SG" }, { "version_affected": "=", "version_value": "3.4.3SG" }, { "version_affected": "=", "version_value": "3.4.4SG" }, { "version_affected": "=", "version_value": "3.4.5SG" }, { "version_affected": "=", "version_value": "3.4.6SG" }, { "version_affected": "=", "version_value": "3.4.7SG" }, { "version_affected": "=", "version_value": "3.4.8SG" }, { "version_affected": "=", "version_value": "3.5.0E" }, { "version_affected": "=", "version_value": "3.5.1E" }, { "version_affected": "=", "version_value": "3.5.2E" }, { "version_affected": "=", "version_value": "3.5.3E" }, { "version_affected": "=", "version_value": "3.10.4S" }, { "version_affected": "=", "version_value": "3.12.0aS" }, { "version_affected": "=", "version_value": "3.6.0E" }, { "version_affected": "=", "version_value": "3.6.1E" }, { "version_affected": "=", "version_value": "3.6.0aE" }, { "version_affected": "=", "version_value": "3.6.0bE" }, { "version_affected": "=", "version_value": "3.6.2aE" }, { "version_affected": "=", "version_value": "3.6.2E" }, { "version_affected": "=", "version_value": "3.6.3E" }, { "version_affected": "=", "version_value": "3.6.4E" }, { "version_affected": "=", "version_value": "3.6.5E" }, { "version_affected": "=", "version_value": "3.6.6E" }, { "version_affected": "=", "version_value": "3.6.5aE" }, { "version_affected": "=", "version_value": "3.6.5bE" }, { "version_affected": "=", "version_value": "3.6.7E" }, { "version_affected": "=", "version_value": "3.6.8E" }, { "version_affected": "=", "version_value": "3.6.7aE" }, { "version_affected": "=", "version_value": "3.6.7bE" }, { "version_affected": "=", "version_value": "3.6.9E" }, { "version_affected": "=", "version_value": "3.6.10E" }, { "version_affected": "=", "version_value": "3.3.0SQ" }, { "version_affected": "=", "version_value": "3.3.1SQ" }, { "version_affected": "=", "version_value": "3.4.0SQ" }, { "version_affected": "=", "version_value": "3.4.1SQ" }, { "version_affected": "=", "version_value": "3.7.0E" }, { "version_affected": "=", "version_value": "3.7.1E" }, { "version_affected": "=", "version_value": "3.7.2E" }, { "version_affected": "=", "version_value": "3.7.3E" }, { "version_affected": "=", "version_value": "3.7.4E" }, { "version_affected": "=", "version_value": "3.7.5E" }, { "version_affected": "=", "version_value": "3.5.0SQ" }, { "version_affected": "=", "version_value": "3.5.1SQ" }, { "version_affected": "=", "version_value": "3.5.2SQ" }, { "version_affected": "=", "version_value": "3.5.3SQ" }, { "version_affected": "=", "version_value": "3.5.4SQ" }, { "version_affected": "=", "version_value": "3.5.5SQ" }, { "version_affected": "=", "version_value": "3.5.6SQ" }, { "version_affected": "=", "version_value": "3.5.7SQ" }, { "version_affected": "=", "version_value": "3.5.8SQ" }, { "version_affected": "=", "version_value": "3.16.1S" }, { "version_affected": "=", "version_value": "3.16.0bS" }, { "version_affected": "=", "version_value": "3.16.10S" }, { "version_affected": "=", "version_value": "3.8.0E" }, { "version_affected": "=", "version_value": "3.8.1E" }, { "version_affected": "=", "version_value": "3.8.2E" }, { "version_affected": "=", "version_value": "3.8.3E" }, { "version_affected": "=", "version_value": "3.8.4E" }, { "version_affected": "=", "version_value": "3.8.5E" }, { "version_affected": "=", "version_value": "3.8.5aE" }, { "version_affected": "=", "version_value": "3.8.6E" }, { "version_affected": "=", "version_value": "3.8.7E" }, { "version_affected": "=", "version_value": "3.9.0E" }, { "version_affected": "=", "version_value": "3.9.1E" }, { "version_affected": "=", "version_value": "3.9.2E" }, { "version_affected": "=", "version_value": "3.9.2bE" }, { "version_affected": "=", "version_value": "16.9.2h" }, { "version_affected": "=", "version_value": "3.10.0E" }, { "version_affected": "=", "version_value": "3.10.1E" }, { "version_affected": "=", "version_value": "3.10.0cE" }, { "version_affected": "=", "version_value": "3.10.1aE" }, { "version_affected": "=", "version_value": "3.10.1sE" }, { "version_affected": "=", "version_value": "16.12.1" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.4", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos" }, { "name": "107612", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107612" } ] }, "source": { "advisory": "cisco-sa-20190327-cmp-dos", "defect": [ [ "CSCvj25068", "CSCvj25124" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1746", "datePublished": "2019-03-27T23:45:13.618675Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:41:58.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…