{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:24:41.604","vulnerabilities":[{"cve":{"id":"CVE-2017-12211","sourceIdentifier":"psirt@cisco.com","published":"2017-09-07T21:29:00.193","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the IPv6 Simple Network Management Protocol (SNMP) code of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause high CPU usage or a reload of the device. The vulnerability is due to IPv6 sub block corruption. An attacker could exploit this vulnerability by polling the affected device IPv6 information. An exploit could allow the attacker to trigger high CPU usage or a reload of the device. Known Affected Releases: Denali-16.3.1. Cisco Bug IDs: CSCvb14640."},{"lang":"es","value":"Una vulnerabilidad en el código del SNMP (Simple Network Management Protocol) IPv6 de Cisco IOS y Cisco IOS XE Software podría permitir que un atacante remoto autenticado haga un uso elevado de recursos de CPU o reinicie el dispositivo. La vulnerabilidad se debe a una corrupción de sub-bloques IPv6. Un atacante podría explotar esta vulnerabilidad sondeando la información IPv6 del dispositivo afectado. Un exploit podría permitir que el atacante realice un uso elevado de recursos de CPU o reinicie el dispositivo. Versiones afectadas conocidas: Denali-16.3.1. Cisco Bug IDs: CSCvb14640."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:N/A:C","baseScore":6.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:3.16.1:*:*:*:*:*:*:*","matchCriteriaId":"018E29DB-FB2B-4180-BE81-E01426DF9F64"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.1:*:*:*:*:*:*:*","matchCriteriaId":"8FDFDEB8-D012-4162-A3C6-7D8F1CA3D618"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/100648","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1039290","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb14640","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-snmp","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/100648","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1039290","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb14640","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-snmp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}