5

CVE-2014-3376

Cisco IOS XR 5.1 and earlier allows remote attackers to cause a denial of service (process reload) via a malformed RSVP packet, aka Bug ID CSCuq12031.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Xr Version2.0
CiscoIos Xr Version3.0
CiscoIos Xr Version3.0.1
CiscoIos Xr Version3.1
CiscoIos Xr Version3.1.0
CiscoIos Xr Version3.2
CiscoIos Xr Version3.2.1
CiscoIos Xr Version3.2.2
CiscoIos Xr Version3.2.4
CiscoIos Xr Version3.2.50
CiscoIos Xr Version3.3
CiscoIos Xr Version3.3.1
CiscoIos Xr Version3.3.2
CiscoIos Xr Version3.3.3
CiscoIos Xr Version3.3.4
CiscoIos Xr Version3.3.5
CiscoIos Xr Version3.4
CiscoIos Xr Version3.4.1
CiscoIos Xr Version3.4.2
CiscoIos Xr Version3.4.3
CiscoIos Xr Version3.5
CiscoIos Xr Version3.5.1
CiscoIos Xr Version3.5.2
CiscoIos Xr Version3.5.3
CiscoIos Xr Version3.5.4
CiscoIos Xr Version3.6
CiscoIos Xr Version3.6.1
CiscoIos Xr Version3.6.2
CiscoIos Xr Version3.6.3
CiscoIos Xr Version3.7
CiscoIos Xr Version3.7.1
CiscoIos Xr Version3.7.2
CiscoIos Xr Version3.7.3
CiscoIos Xr Version3.8.0
CiscoIos Xr Version3.8.1
CiscoIos Xr Version3.8.2
CiscoIos Xr Version3.8.3
CiscoIos Xr Version3.8.4
CiscoIos Xr Version3.9.0
CiscoIos Xr Version3.9.1
CiscoIos Xr Version3.9.2
CiscoIos Xr Version4.0.0
CiscoIos Xr Version4.0.1
CiscoIos Xr Version4.0.2
CiscoIos Xr Version4.0.3
CiscoIos Xr Version4.0.4
CiscoIos Xr Version4.1
CiscoIos Xr Version4.1.1
CiscoIos Xr Version4.1.2
CiscoIos Xr Version4.2.0
CiscoIos Xr Version4.3.0
CiscoIos Xr Version4.3.1
CiscoIos Xr Version4.3.2
CiscoIos Xr Version4.3.4
CiscoIos Xr Version5.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.39% 0.795
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.