Show plain JSON{"id": "CVE-2011-2059", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-10-22T02:59:19.323", "references": [{"url": "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor", "tags": ["Broken Link"], "source": "psirt@cisco.com"}, {"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0", "tags": ["Vendor Advisory"], "source": "psirt@cisco.com"}, {"url": "http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-200"}]}], "descriptions": [{"lang": "en", "value": "The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219."}, {"lang": "es", "value": "El componente IPv6 en Cisco IOS anterior a v15.1(4)M1.3 permite a atacantes remotos a realizar ataques para la obtenci\u00f3n de datos del servidor (fingerprinter) y obtener informaci\u00f3n potencialmente sensible acerca de la presencia del sistema operativo IOS a trav\u00e9s de un paquete de petici\u00f3n eco ICMPv6 que contenga una cabecera Hop-by-hop (HBH) cabecera de extensi\u00f3n (EH) con un valor 0x0c01050c en los datos de opci\u00f3n PadN, tambi\u00e9n conocido como Bug ID CSCtq02219."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22AA4B1A-1D54-4E84-9CE5-8F6CBD7C6E1B", "versionEndExcluding": "15.1\\(4\\)m1.3"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@cisco.com"}