{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T10:05:37.672","vulnerabilities":[{"cve":{"id":"CVE-2016-6441","sourceIdentifier":"psirt@cisco.com","published":"2016-11-03T21:59:02.967","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Transaction Language 1 (TL1) code of Cisco ASR 900 Series routers could allow an unauthenticated, remote attacker to cause a reload of, or remotely execute code on, the affected system. This vulnerability affects Cisco ASR 900 Series Aggregation Services Routers (ASR902, ASR903, and ASR907) that are running the following releases of Cisco IOS XE Software: 3.17.0S 3.17.1S 3.17.2S 3.18.0S 3.18.1S. More Information: CSCuy15175. Known Affected Releases: 15.6(1)S 15.6(2)S. Known Fixed Releases: 15.6(1)S2.12 15.6(1.17)S0.41 15.6(1.17)SP 15.6(2)SP 16.4(0.183) 16.5(0.10)."},{"lang":"es","value":"Una vulnerabilidad en el código Transaction Language 1 (TL1) de routers Cisco ASR 900 Series podría permitir a un atacante remoto no autenticado provocar un reinicio de, o ejecución remota de código en, el sistema afectado. Esta vulnerabilidad afecta a Cisco ASR 900 Series Aggregation Services Routers (ASR902, ASR903 y ASR907) que están ejecutando las siguientes versiones de Cisco IOS XE Software: 3.17.0S 3.17.1S 3.17.2S 3.18.0S 3.18.1S. Más información: CSCuy15175. Lanzamientos conocidos afectados: 15.6(1)S 15.6(2)S. Lanzamientos conocidos solucionados: 15.6(1)S2.12 15.6(1.17)S0.41 15.6(1.17)SP 15.6(2)SP 16.4(0.183) 16.5(0.10)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*","matchCriteriaId":"12793F39-13C4-4DBC-9B78-FE361BDDF89D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*","matchCriteriaId":"876767C7-0196-4226-92B1-DDE851B53655"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*","matchCriteriaId":"0141D67B-632F-48ED-8837-4CC799616C57"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17s:*:*:*:*:*:*:*","matchCriteriaId":"3C61D3C1-3A56-49B3-BF68-6E103C5654AA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*","matchCriteriaId":"EE81AA43-88D4-4EFC-B8F6-A41EFF437819"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*","matchCriteriaId":"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18s:*:*:*:*:*:*:*","matchCriteriaId":"3C875016-4D4C-4E24-ADB2-2D767CD77EE1"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/94072","source":"psirt@cisco.com"},{"url":"http://www.securitytracker.com/id/1037179","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tl1","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94072","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1037179","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tl1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}