{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:07:27.011","vulnerabilities":[{"cve":{"id":"CVE-2016-6450","sourceIdentifier":"psirt@cisco.com","published":"2016-11-19T03:02:59.117","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system. This vulnerability affects the following products if they are running a vulnerable release of Cisco IOS XE Software: Cisco 5700 Series Wireless LAN Controllers, Cisco Catalyst 3650 Series Switches, Cisco Catalyst 3850 Series Switches, Cisco Catalyst 4500E Series Switches, Cisco Catalyst 4500X Series Switches. More Information: CSCva60013 CSCvb22622. Known Affected Releases: 3.7(0) 16.4.1 Denali-16.1.3 Denali-16.2.2 Denali-16.3.1. Known Fixed Releases: 15.2(4)E3 16.1(2.208) 16.2(2.42) 16.3(1.22) 16.4(0.190) 16.5(0.29)."},{"lang":"es","value":"Una vulnerabilidad en la utilidad de desagrupar paquetes del Software Cisco IOS XE podrían permitir a un atacante local autenticado obtener acceso de escritura a algunos archivos del sistema operativo subyaciente. Esta vulnerabilidad afecta a los siguientes productos si están ejecutando una versión vulnerable del Software Cisco IOS XE: Cisco 5700 Series Wireless LAN Controllers, Cisco Catalyst 3650 Series Switches, Cisco Catalyst 3850 Series Switches, Cisco Catalyst 4500E Series Switches, Cisco Catalyst 4500X Series Switches. Más información: CSCva60013 CSCvb22622. Lanzamientos afectados conocidos: 3.7(0) 16.4.1 Denali-16.1.3 Denali-16.2.2 Denali-16.3.1. Lanzamientos conocidos solucionados: 15.2(4)E3 16.1(2.208) 16.2(2.42) 16.3(1.22) 16.4(0.190) 16.5(0.29)."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":2.5,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:N/I:P/A:N","baseScore":1.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*","matchCriteriaId":"39DED4C1-E7AF-48E0-8B1A-839A87E52992"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*","matchCriteriaId":"E77A9A46-517E-467B-A702-E6F6DD9FCD96"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*","matchCriteriaId":"AD485792-290B-4553-AAB2-DA7427DE7131"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*","matchCriteriaId":"6907E1FE-760E-4557-A472-1A1F0052B82B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*","matchCriteriaId":"0ED5527C-A638-4E20-9928-099E32E17743"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*","matchCriteriaId":"1A685A9A-235D-4D74-9D6C-AC49E75709CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*","matchCriteriaId":"43052998-0A27-4E83-A884-A94701A3F4CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*","matchCriteriaId":"89526731-B712-43D3-B451-D7FC503D2D65"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*","matchCriteriaId":"302933FE-4B6A-48A3-97F0-4B943251B717"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*","matchCriteriaId":"296636F1-9242-429B-8472-90352C056106"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/94340","source":"psirt@cisco.com"},{"url":"http://www.securitytracker.com/id/1037299","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94340","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1037299","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}