{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T23:56:16.487","vulnerabilities":[{"cve":{"id":"CVE-2017-6612","sourceIdentifier":"psirt@cisco.com","published":"2017-07-25T19:29:00.177","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the gateway GPRS support node (GGSN) of Cisco ASR 5000 Series Aggregation Services Routers 17.3.9.62033 through 21.1.2 could allow an unauthenticated, remote attacker to redirect HTTP traffic sent to an affected device. More Information: CSCvc67927."},{"lang":"es","value":"Una vulnerabilidad en el nodo de soporte del gateway GPRS (GGSN) de ASR 5000 Series Aggregation Services Routers versión 17.3.9.62033 hasta 21.1.2 de Cisco, podría permitir a un atacante remoto no autenticado redireccionar el tráfico HTTP enviado hacia un dispositivo afectado. Más información: CSCvc67927."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:17.3.9.62033:*:*:*:*:*:*:*","matchCriteriaId":"909549D4-A2D3-473F-9982-36C3709749A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:17.7.5:*:*:*:*:*:*:*","matchCriteriaId":"AD8C599F-D45E-4613-9DEC-9ECC6C2B600B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:19.6.3:*:*:*:*:*:*:*","matchCriteriaId":"4A32B7EC-24D8-4344-AD67-0C2479BD2443"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:20.1.2:*:*:*:*:*:*:*","matchCriteriaId":"D80A1B52-D2D3-4EC0-82FF-D8D3AE01185F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:20.2.12:*:*:*:*:*:*:*","matchCriteriaId":"857DEC6B-8984-468B-9926-F0862D0A4EE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:21.0.1:*:*:*:*:*:*:*","matchCriteriaId":"9C137DA3-4CBE-4FCB-BC26-BBB82C392B21"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:asr_5000_series_software:21.1.2:*:*:*:*:*:*:*","matchCriteriaId":"7E56217A-1BD5-431B-8BF5-F32714BD79CC"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/99920","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038961","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-asr","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99920","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1038961","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-asr","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}