2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2016-1347" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2016-03-24T22:59:00.077" ,
2025-04-12 12:06:01 +00:00
"lastModified" : "2025-04-12T10:46:40.837" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Wide Area Application Services (WAAS) Express implementation in Cisco IOS 15.1 through 15.5 allows remote attackers to cause a denial of service (device reload) via a crafted TCP segment, aka Bug ID CSCuq59708."
} ,
{
"lang" : "es" ,
"value" : "La implementaci\u00f3n de Wide Area Application Services (WAAS) Express en Cisco IOS 15.1 hasta la versi\u00f3n 15.5 permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un segmento TCP manipulado, tambi\u00e9n conocida como Bug ID CSCuq59708."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-11-23 05:11:48 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 05:11:48 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-23 05:11:48 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 05:11:48 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B082C941-CE02-440F-8DD7-87873504B964"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B770E747-517E-42FE-9197-8E654F294B3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D6836A1-5F15-44E2-AA5E-4CD0DDDB9692"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B59E042B-9A4B-4959-9B6A-FBDF431EB3E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb5a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FBB1846-D09A-4F66-AD7F-45A2236D8839"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75A272B8-DC6C-4D40-9C21-FFBC6BDFE836"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "064E2B27-4067-49EF-A95A-8BC49E05662E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4035C938-2BAB-43C1-8302-8F22D4D3D0DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)xb8a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CC3BEF0-8E19-4464-92B5-2C6521AE126C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D4358B9-F3DB-46AC-A3A8-114E25F676DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96FDDD94-40C9-47F0-9D43-0C0267F439C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E6ED45F-4479-445D-8970-F90413C51B7A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EAE1AD0D-C3E9-488C-89CB-F2342CF6D5A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9279A96A-43B2-4FD4-97F0-DA331EACF918"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7855CC38-5E3E-486D-9322-7BF0DC1FF623"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C1EE552E-226C-46DE-9861-CB148AD8FB44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CAF02C8E-9BB2-4DC2-8BF1-932835191F09"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74E1226B-46CF-4C82-911A-86C818A75DFA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "100DA24F-464E-4273-83DF-6428D0ED6641"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "063C0C47-25EB-4AA4-9332-8E43CD60FF39"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "02866AED-A1B4-4D89-A11F-27089EF935BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C85BAAF-819B-40E7-9099-04AA8D9AB114"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED684DB4-527A-4268-B197-4719B0178429"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "88F41406-0F55-4D74-A4F6-4ABD5A803907"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7082C083-7517-4CD4-BF95-CC7AF08D4053"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F5D3761-16C8-413A-89AD-C076B9B92FF1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F690BEC9-FAE9-4C02-9993-34BF14FA99EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "716EC9AA-0569-4FA7-A244-1A14FA15C5AD"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1035380" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Broken Link"
]
2024-11-23 05:11:48 +00:00
} ,
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-l4f" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1035380" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
}
]
}