8.6

CVE-2019-12657

A vulnerability in Unified Threat Defense (UTD) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper validation of IPv6 packets through the UTD feature. An attacker could exploit this vulnerability by sending IPv6 traffic through an affected device that is configured with UTD. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoIos Xe Version16.3.6
   Cisco4321 Integrated Services Router Version-
   Cisco4331 Integrated Services Router Version-
   Cisco4351 Integrated Services Router Version-
   Cisco4431 Integrated Services Router Version-
   Cisco4451-x Integrated Services Router Version-
   CiscoAsr 1000 Version-
   CiscoAsr 1001-hx Version-
   CiscoAsr 1001-x Version-
   CiscoAsr 1002-hx Version-
   CiscoAsr 1002-x Version-
   CiscoCatalyst 3650-12x48fd-e Version-
   CiscoCatalyst 3650-12x48fd-l Version-
   CiscoCatalyst 3650-12x48fd-s Version-
   CiscoCatalyst 3650-12x48uq-e Version-
   CiscoCatalyst 3650-12x48uq-l Version-
   CiscoCatalyst 3650-12x48uq-s Version-
   CiscoCatalyst 3650-12x48ur-e Version-
   CiscoCatalyst 3650-12x48ur-l Version-
   CiscoCatalyst 3650-12x48ur-s Version-
   CiscoCatalyst 3650-12x48uz-e Version-
   CiscoCatalyst 3650-12x48uz-l Version-
   CiscoCatalyst 3650-12x48uz-s Version-
   CiscoCatalyst 3650-24pd-e Version-
   CiscoCatalyst 3650-24pd-l Version-
   CiscoCatalyst 3650-24pd-s Version-
   CiscoCatalyst 3650-24pdm-e Version-
   CiscoCatalyst 3650-24pdm-l Version-
   CiscoCatalyst 3650-24pdm-s Version-
   CiscoCatalyst 3650-24ps-e Version-
   CiscoCatalyst 3650-24ps-l Version-
   CiscoCatalyst 3650-24ps-s Version-
   CiscoCatalyst 3650-24td-e Version-
   CiscoCatalyst 3650-24td-l Version-
   CiscoCatalyst 3650-24td-s Version-
   CiscoCatalyst 3650-24ts-e Version-
   CiscoCatalyst 3650-24ts-l Version-
   CiscoCatalyst 3650-24ts-s Version-
   CiscoCatalyst 3650-48fd-e Version-
   CiscoCatalyst 3650-48fd-l Version-
   CiscoCatalyst 3650-48fd-s Version-
   CiscoCatalyst 3650-48fq-e Version-
   CiscoCatalyst 3650-48fq-l Version-
   CiscoCatalyst 3650-48fq-s Version-
   CiscoCatalyst 3650-48fqm-e Version-
   CiscoCatalyst 3650-48fqm-l Version-
   CiscoCatalyst 3650-48fqm-s Version-
   CiscoCatalyst 3650-48fs-e Version-
   CiscoCatalyst 3650-48fs-l Version-
   CiscoCatalyst 3650-48fs-s Version-
   CiscoCatalyst 3650-48pd-e Version-
   CiscoCatalyst 3650-48pd-l Version-
   CiscoCatalyst 3650-48pd-s Version-
   CiscoCatalyst 3650-48pq-e Version-
   CiscoCatalyst 3650-48pq-l Version-
   CiscoCatalyst 3650-48pq-s Version-
   CiscoCatalyst 3650-48ps-e Version-
   CiscoCatalyst 3650-48ps-l Version-
   CiscoCatalyst 3650-48ps-s Version-
   CiscoCatalyst 3650-48td-e Version-
   CiscoCatalyst 3650-48td-l Version-
   CiscoCatalyst 3650-48td-s Version-
   CiscoCatalyst 3650-48tq-e Version-
   CiscoCatalyst 3650-48tq-l Version-
   CiscoCatalyst 3650-48tq-s Version-
   CiscoCatalyst 3650-48ts-e Version-
   CiscoCatalyst 3650-48ts-l Version-
   CiscoCatalyst 3650-48ts-s Version-
   CiscoCatalyst 3650-8x24pd-e Version-
   CiscoCatalyst 3650-8x24pd-l Version-
   CiscoCatalyst 3650-8x24pd-s Version-
   CiscoCatalyst 3650-8x24uq-e Version-
   CiscoCatalyst 3650-8x24uq-l Version-
   CiscoCatalyst 3650-8x24uq-s Version-
   CiscoCatalyst 3850-12s-e Version-
   CiscoCatalyst 3850-12s-s Version-
   CiscoCatalyst 3850-12xs-e Version-
   CiscoCatalyst 3850-12xs-s Version-
   CiscoCatalyst 3850-16xs-e Version-
   CiscoCatalyst 3850-16xs-s Version-
   CiscoCatalyst 3850-24p-e Version-
   CiscoCatalyst 3850-24p-l Version-
   CiscoCatalyst 3850-24p-s Version-
   CiscoCatalyst 3850-24s-e Version-
   CiscoCatalyst 3850-24s-s Version-
   CiscoCatalyst 3850-24t-e Version-
   CiscoCatalyst 3850-24t-l Version-
   CiscoCatalyst 3850-24t-s Version-
   CiscoCatalyst 3850-24u-e Version-
   CiscoCatalyst 3850-24u-l Version-
   CiscoCatalyst 3850-24u-s Version-
   CiscoCatalyst 3850-24xs-e Version-
   CiscoCatalyst 3850-24xs-s Version-
   CiscoCatalyst 3850-24xu-e Version-
   CiscoCatalyst 3850-24xu-l Version-
   CiscoCatalyst 3850-24xu-s Version-
   CiscoCatalyst 3850-32xs-e Version-
   CiscoCatalyst 3850-32xs-s Version-
   CiscoCatalyst 3850-48f-e Version-
   CiscoCatalyst 3850-48f-l Version-
   CiscoCatalyst 3850-48f-s Version-
   CiscoCatalyst 3850-48p-e Version-
   CiscoCatalyst 3850-48p-l Version-
   CiscoCatalyst 3850-48p-s Version-
   CiscoCatalyst 3850-48t-e Version-
   CiscoCatalyst 3850-48t-l Version-
   CiscoCatalyst 3850-48t-s Version-
   CiscoCatalyst 3850-48u-e Version-
   CiscoCatalyst 3850-48u-l Version-
   CiscoCatalyst 3850-48u-s Version-
   CiscoCatalyst 3850-48xs-e Version-
   CiscoCatalyst 3850-48xs-f-e Version-
   CiscoCatalyst 3850-48xs-f-s Version-
   CiscoCatalyst 3850-48xs-s Version-
   CiscoCatalyst C3850-12x48u-e Version-
   CiscoCatalyst C3850-12x48u-l Version-
   CiscoCatalyst C3850-12x48u-s Version-
   CiscoCloud Services Router 1000v Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.45% 0.802
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
psirt@cisco.com 8.6 3.9 4
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.