Show plain JSON{"id": "CVE-2013-1164", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-04-11T10:55:01.873", "references": [{"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000", "tags": ["Vendor Advisory"], "source": "psirt@cisco.com"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cisco IOS XE 3.4 before 3.4.4S, 3.5, and 3.6 on 1000 series Aggregation Services Routers (ASR) does not properly implement the Cisco Multicast Leaf Recycle Elimination (MLRE) feature, which allows remote attackers to cause a denial of service (card reload) via fragmented IPv6 multicast packets, aka Bug ID CSCtz97563."}, {"lang": "es", "value": "Cisco IOS XE v3.4 antes de v3.4.4S, v3.5 y 3.6 en la Series Routers 1000 de Servicios de agregaci\u00f3n (ASR) no aplicar correctamente el Cisco Multicast Leaf Eliminaci\u00f3n de reciclaje (MLRE), la cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de tarjeta ) a trav\u00e9s de paquetes fragmentados IPv6 multicast, tambi\u00e9n conocido como Bug ID CSCtz97563."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45225F2-C9EB-493D-B845-64BFB8DBB89B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252377A3-7F15-45F2-A169-BBC37858D4DA"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02E8F96A-EA9C-4E66-8491-9B2A3A4023F5"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85908754-8426-49D3-BCC2-AF174B5D0EF8"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F5BA973-D59A-4CB9-BC35-089F88737425"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5872A42F-745E-4EC6-8679-C28F79F6621C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EB5A06F-59B5-43A1-8D06-1B6BA08630A1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E"}, {"criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F"}, {"criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F"}, {"criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B"}, {"criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D"}, {"criteria": "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "854D9594-FE84-4E7B-BA21-A3287F2DC302"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@cisco.com"}