{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T17:40:35.328","vulnerabilities":[{"cve":{"id":"CVE-2009-0625","sourceIdentifier":"psirt@cisco.com","published":"2009-02-26T16:17:20.217","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8.0) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv3 packet."},{"lang":"es","value":"Vulnerabilidad no especificada en \"Cisco ACE  Application Control Engine Module\" para Switches Catalyst 6500 y routers anteriores A1(v1.2) y Cisco ACE 4710 \"Application Control Engine Appliance\" anteriores A1(8.0), permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un paquete SNMPv3 manipulada. \r\n"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*","versionEndIncluding":"a1\\(2.0\\)","matchCriteriaId":"6F0D8DA3-2B73-4DE7-933B-23C199B50BD9"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:application_control_engine_module:*:*:*:*:*:*:*:*","versionEndIncluding":"a2\\(1.1\\)","matchCriteriaId":"8AF3BB9E-7AAE-4B04-B5A5-B61FE82AA94F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst:6500:*:*:*:*:*:*:*","matchCriteriaId":"712DA93A-13CE-4E27-84FC-D2ECEEFFD568"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst:7600:*:*:*:*:*:*:*","matchCriteriaId":"521A4FD3-18E3-4937-A6AD-F7BDB3DB08ED"}]}]}],"references":[{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33900","source":"psirt@cisco.com"},{"url":"http://www.securitytracker.com/id?1021769","source":"psirt@cisco.com"},{"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/33900","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1021769","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}