{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:01:33.596","vulnerabilities":[{"cve":{"id":"CVE-2018-0421","sourceIdentifier":"psirt@cisco.com","published":"2018-10-05T14:29:00.623","lastModified":"2024-11-21T03:38:11.630","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts. The vulnerability is due to incorrect handling of incoming TCP SYN packets to specific listening ports. The improper handling of the TCP SYN packets could cause a system file description to be allocated and not freed. An attacker could exploit this vulnerability by sending a crafted stream of TCP SYN packets to the application. A successful exploit could allow the attacker to cause the application to eventually restart if a file description cannot be obtained."},{"lang":"es","value":"Una vulnerabilidad en la administración de las conexiones TCP en Cisco Prime Access Registrar podría permitir que un atacante remoto sin autenticar provoque una denegación de servicio (DoS) cuando la aplicación se reinicia de manera inesperada. Esta vulnerabilidad se debe al manejo incorrecto de los paquetes TCP SYN en puertos de escucha específicos. El manejo incorrecto de los paquetes TCP SYN podría provocar que se asigne y no se libere una descripción de un archivo del sistema. Un atacante podría explotar esta vulnerabilidad enviando un flujo manipulado de paquetes TCP SYN a la aplicación. Su explotación con éxito podría permitir que el atacante provoque que la aplicación acabe por reiniciarse si no se puede obtener una descripción de archivo."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3","versionEndExcluding":"7.3.0.4","matchCriteriaId":"4122D49A-3EB8-4DFF-9712-E7CBE2DD72E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0","versionEndExcluding":"8.0.1.1","matchCriteriaId":"B99D7CAE-733C-484D-AB98-7C89B8759ABD"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_access_registrar_jumpstart:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3","versionEndExcluding":"7.3.0.4","matchCriteriaId":"FAD29882-1851-4D2C-9B4E-0870DEED4F5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:prime_access_registrar_jumpstart:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0","versionEndExcluding":"8.0.1.1","matchCriteriaId":"5D64A87E-B624-4B3E-BEA8-458D10656C5C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105282","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041684","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105282","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041684","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}