{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T21:15:43.531","vulnerabilities":[{"cve":{"id":"CVE-2019-1697","sourceIdentifier":"psirt@cisco.com","published":"2019-05-03T16:29:00.240","lastModified":"2024-11-21T04:37:07.460","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets sent to an affected device. An attacker could exploit these vulnerabilities by sending a crafted LDAP packet, using Basic Encoding Rules (BER), to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la implementación de la función del Lightweight Directory Access Protocol (LDAP) en el software Cisco Adaptive Security Appliance (ASA) y en el software Firepower Threat Defense (FTD) podría permitir que un atacante remoto no autenticado provoque la recarga de un dispositivo afectado, lo que resulta en una Condición de denegación de servicio (DoS). Las vulnerabilidades se deben al análisis incorrecto de los paquetes LDAP enviados a un dispositivo afectado. Un atacante podría explotar estas vulnerabilidades enviando un paquete LDAP creado, usando Reglas de codificación básicas (BER), para ser procesado por un dispositivo afectado. Una explotación con éxito podría permitir que el atacante haga que el dispositivo afectado se vuelva a cargar, lo que resulta en una condición DoS."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionEndExcluding":"9.6.4.25","matchCriteriaId":"259E2B41-3EC2-42D3-AAF1-4B855F9E28C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.7","versionEndExcluding":"9.8.4","matchCriteriaId":"C812C8D5-3159-434C-8B9F-8CB0A8767923"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.9","versionEndExcluding":"9.9.2.50","matchCriteriaId":"ABCD2AF8-97D4-45C6-B80E-D5FA9B719BD5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.10","versionEndExcluding":"9.10.1.17","matchCriteriaId":"B4C6B343-2D4D-4C7E-A59E-629773DD2E60"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*","matchCriteriaId":"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*","matchCriteriaId":"B091B9BA-D4CA-435B-8D66-602B45F0E0BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*","matchCriteriaId":"08F0F160-DAD2-48D4-B7B2-4818B2526F35"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*","matchCriteriaId":"977D597B-F6DE-4438-AB02-06BE64D71EBE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*","matchCriteriaId":"2B387F62-6341-434D-903F-9B72E7F84ECB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*","matchCriteriaId":"EB71EB29-0115-4307-A9F7-262394FD9FB0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*","matchCriteriaId":"17C5A524-E1D9-480F-B655-0680AA5BF720"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*","matchCriteriaId":"57179F60-E330-4FF0-9664-B1E4637FF210"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*","matchCriteriaId":"E6287D95-F564-44B7-A0F9-91396D7C2C4E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*","matchCriteriaId":"5535C936-391B-4619-AA03-B35265FC15D7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*","matchCriteriaId":"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*","matchCriteriaId":"16AE20C2-C77E-4E04-BF13-A48696E52426"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionEndExcluding":"6.2.3.12","matchCriteriaId":"15251834-D900-42F9-AC0B-4167CE851116"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.0","versionEndExcluding":"6.3.0.3","matchCriteriaId":"9A16803C-579C-4992-B37E-7CEC17307659"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/108182","source":"psirt@cisco.com"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftds-ldapdos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/108182","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftds-ldapdos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}