Show plain JSON{"id": "CVE-2004-1432", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"url": "http://secunia.com/advisories/12117", "source": "cve@mitre.org"}, {"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/918920", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.kb.cert.org/vuls/id/969344", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/10768", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/12117", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040721-ons.shtml", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/918920", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/969344", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/10768", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16760", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16761", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via malformed (1) IP or (2) ICMP packets."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D1888FF-6126-4F40-A7EA-1ED5123FA729"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15B6D45F-25A7-4055-9D9C-42DEACBFFE17"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31461FAA-2F90-47B0-BDA3-D81A8186960C"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EF8D104-CABD-4036-A4AF-68B80D83AE34"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5331AAD2-7E21-4407-9DF7-9D2A8058FAE0"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89112E5-3FAC-4E4A-9C7D-F60BCF4A28E3"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B0A4FA3-45F4-47B7-BA5B-6AEC8DB14C9E"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6509622E-7E8D-4238-92F2-7DB88A3DB4DA"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80460930-7D3D-4315-8D00-FFDCDBA69477"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B80C7D72-D0D1-4328-967C-20EA7590CEC1"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0993B9A9-599B-4662-AEC2-EC771BCE8200"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04472ED2-EB97-47E1-938E-D69C363E81C4"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C607FB31-58DF-4C65-A35B-C9C1A6437CA4"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10988AA9-A807-4E70-8197-6F9EFC13AE86"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8951276-CDEF-4F54-93DF-B96DB10E6530"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D886A75-5A73-4B1C-8B2A-45D589267B37"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5A594C2-98BB-4AC5-9CC5-89FE97D63323"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B35325A-98F6-41DF-ADD8-91ED992A3ED3"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0B06C5B-73C2-47F1-9ED6-B59F9C1C5AF1"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9758019-F6EA-4552-B070-5A9EBE73BB86"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA524BE1-6B13-455A-96EA-17C1A71BD0F2"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DEC7814-61D4-420A-AB81-6720F3C2D6B9"}, {"criteria": "cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "413133A5-F600-4B2B-82E1-3EAC10B7E6F9"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}