Show plain JSON{"id": "CVE-2019-1617", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 6.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 7.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 7.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 2.8}]}, "published": "2019-03-11T21:29:01.027", "references": [{"url": "http://www.securityfocus.com/bid/107336", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-npv-dos", "tags": ["Exploit", "Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "http://www.securityfocus.com/bid/107336", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-npv-dos", "tags": ["Exploit", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-913"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-913"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Fibre Channel over Ethernet (FCoE) N-port Virtualization (NPV) protocol implementation in Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to an incorrect processing of FCoE packets when the fcoe-npv feature is uninstalled. An attacker could exploit this vulnerability by sending a stream of FCoE frames from an adjacent host to an affected device. An exploit could allow the attacker to cause packet amplification to occur, resulting in the saturation of interfaces and a DoS condition. Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I7(5) and 9.2(2)."}, {"lang": "es", "value": "Una vulnerabilidad en la implementaci\u00f3n del protocolo Fibre Channel over Ethernet (FCoE) N-port Virtualization (NPV) en el software NX-OS de Cisco podr\u00eda permitir a un atacante adyacente sin autenticar provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se debe a un procesamiento incorrecto de paquetes FCoE cuando la funcionalidad fcoe-npv no est\u00e1 instalada. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un flujo de tramas FCoE desde un host adyacente a un dispositivo afectado. Un exploit podr\u00eda permitir al atacante provocar una amplificaci\u00f3n de paquetes, conduciendo a la saturaci\u00f3n de interfaces y una condici\u00f3n DoS. Los switches de Nexus 9000 Series en modo Standalone NX-OS se ven afectados en versiones de software anteriores a las 7.0(3)I7(5) y 9.2(2)."}], "lastModified": "2024-11-21T04:36:56.387", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38F5064-F7E2-4B6F-BB50-32DBC205E164", "versionEndExcluding": "9.2\\(2\\)", "versionStartIncluding": "9.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8397775-5A75-4710-9044-B56E1CEE20A1"}, {"criteria": "cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C71319A9-5B95-410A-BDDB-C47639B8E464"}, {"criteria": "cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7B573EF4-2ABE-4ABE-A8D6-D8E14AD29E73"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2E84307-41BC-4F85-BC9A-FF02178765F8"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55A31452-5B60-4273-BA38-8FA684DED953"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C3FCA39-927B-4C89-A58B-E6859ED8176A"}, {"criteria": "cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6B8F7177-147E-47C0-ADFB-4CD0768D52CD"}, {"criteria": "cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC0082AD-1EFB-4AFE-9974-EAAB926553F3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E6B1F53-1B45-4F6B-9FD3-E6E417E55D1D", "versionEndExcluding": "7.0\\(3\\)i7\\(5\\)", "versionStartIncluding": "7.0\\(3\\)i5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8397775-5A75-4710-9044-B56E1CEE20A1"}, {"criteria": "cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C71319A9-5B95-410A-BDDB-C47639B8E464"}, {"criteria": "cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7B573EF4-2ABE-4ABE-A8D6-D8E14AD29E73"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2E84307-41BC-4F85-BC9A-FF02178765F8"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55A31452-5B60-4273-BA38-8FA684DED953"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C3FCA39-927B-4C89-A58B-E6859ED8176A"}, {"criteria": "cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6B8F7177-147E-47C0-ADFB-4CD0768D52CD"}, {"criteria": "cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC0082AD-1EFB-4AFE-9974-EAAB926553F3"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}