{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T08:36:32.949","vulnerabilities":[{"cve":{"id":"CVE-2017-12219","sourceIdentifier":"psirt@cisco.com","published":"2017-09-21T05:29:00.327","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the handling of IP fragments for the Cisco Small Business SPA300, SPA500, and SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to the inability to handle many large IP fragments for reassembly in a short duration. An attacker could exploit this vulnerability by sending a crafted stream of IP fragments to the targeted device. An exploit could allow the attacker to cause a DoS condition when the device unexpectedly reloads. Cisco Bug IDs: CSCve82586."},{"lang":"es","value":"Existe una vulnerabilidad en la gestión de los fragmentos de IP para Cisco Small Business SPA300, SPA500, y SPA51x Series IP Phones que podría permitir a un atacante autenticado remoto provocar que el dispositivo recargue de manera inesperada, provocando una denegación de servicio (DoS). Esta vulnerabilidad se debe a la incapacidad para gestionar muchos fragmentos de IP largos para reensamblarlos en un espacio de tiempo pequeño. Un atacante podría explotar esta vulnerabilidad enviando una serie de fragmentos de IP manipulados al dispositivo objetivo. Su explotación podría permitir a un atacante provocar una denegación de servicio cuando el dispositivo recarga de manera inesperada. Cisco Bug IDs: CSCve82586."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_301_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"5E955BFE-A202-492C-B0A2-1EC620806988"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_301:-:*:*:*:*:*:*:*","matchCriteriaId":"8CE3C04F-884C-4CD1-8503-DB60CCC1B1F3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_303_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"ED774745-8D65-422A-888F-37D3E71C1682"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_303:-:*:*:*:*:*:*:*","matchCriteriaId":"F04B0F29-5620-4714-A151-7CDA2B9D8F2F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_500ds_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"3AA8347D-0E1A-4E00-9E95-ADC376F867B2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_500ds:-:*:*:*:*:*:*:*","matchCriteriaId":"37E3C90F-011D-454C-8E0C-92E72A6EFE1D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_500s_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"C66A6032-B44B-486B-8522-6DB99314BDEC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_500s:-:*:*:*:*:*:*:*","matchCriteriaId":"90C72E35-F124-4D09-AA68-0678ACBA590D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_501g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"29312DC7-EFF2-4E17-A22B-76F5F8638E7B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_501g:-:*:*:*:*:*:*:*","matchCriteriaId":"9A258316-4DB6-47AC-90C0-CB9EF777E151"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_502g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"A481F1A9-4F99-4AB7-94B7-C7768370D4D9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_502g:-:*:*:*:*:*:*:*","matchCriteriaId":"D5DF893E-7E9E-419B-8E7C-E846333646BA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_504g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"07646977-B2A5-4311-9AFE-605FDC694855"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_504g:-:*:*:*:*:*:*:*","matchCriteriaId":"4F78AAB2-8ECD-4FAA-8A2A-9035F5C59597"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_508g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"A002C4EF-8259-4896-A748-57412A8D3375"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_508g:-:*:*:*:*:*:*:*","matchCriteriaId":"1B26A21E-CD32-4DED-8A31-4CCA1C4DD642"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_509g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"26E77DAF-E479-4F52-88A7-7189B326429D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_509g:-:*:*:*:*:*:*:*","matchCriteriaId":"2A4373DD-753A-46A6-BB96-0488EA52157E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_512g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"1A432C3A-C720-465E-9916-C329718BABCB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_512g:-:*:*:*:*:*:*:*","matchCriteriaId":"2CBA0C4D-4BB6-455D-8355-F4FACC5D721C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa_514g_firmware:7.6.2:*:*:*:*:*:*:*","matchCriteriaId":"21EF3707-FE37-425B-9C0A-297CB62B28A0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa_514g:-:*:*:*:*:*:*:*","matchCriteriaId":"97551DEA-85F9-4A38-A8AC-F477CB7ABC2C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/100926","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1039413","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-spa","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/100926","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1039413","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-spa","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}