{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T08:38:28.652","vulnerabilities":[{"cve":{"id":"CVE-2019-12653","sourceIdentifier":"psirt@cisco.com","published":"2019-09-25T21:15:10.657","lastModified":"2024-11-21T04:23:16.193","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad Raw Socket Transport del software Cisco IOS XE, podría permitir a un atacante remoto no autenticado desencadenar una recarga de un dispositivo afectado, resultando en una condición de denegación de servicio (DoS). La vulnerabilidad es debido al análisis inapropiado de las cargas útiles de Raw Socket Transport. Un atacante podría explotar esta vulnerabilidad al establecer una sesión TCP y entonces enviar un segmento TCP malicioso por medio de IPv4 hacia un dispositivo afectado. Esto no puede ser explotado por medio de IPv6, ya que la función de Raw Socket Transport no admite IPv6 como protocolo de capa de red."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:*","matchCriteriaId":"4D42A82B-7241-4564-BCC1-9C4E7EB18881"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*","matchCriteriaId":"DB6BD18B-B9BD-452F-986E-16A6668E46B6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*","matchCriteriaId":"70352B04-C3FD-47F5-A2F8-691CF63EB50D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*","matchCriteriaId":"FE063AF2-5579-4D7E-8829-9102FC7CB994"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*","matchCriteriaId":"51938C0A-AFDB-4B12-BB64-9C67FC0C738F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*","matchCriteriaId":"A18E4A46-10D3-48F8-9E92-377ACA447257"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*","matchCriteriaId":"67D5E61B-9F17-4C56-A1BB-3EE08CB62C53"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-rawtcp-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-rawtcp-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}