{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T13:03:53.607","vulnerabilities":[{"cve":{"id":"CVE-2019-1706","sourceIdentifier":"psirt@cisco.com","published":"2019-05-03T16:29:00.617","lastModified":"2024-11-21T04:37:08.653","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the software cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) and Firepower 2100 Series running Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device that results in a denial of service (DoS) condition. The vulnerability is due to a logic error with how the software cryptography module handles IPsec sessions. An attacker could exploit this vulnerability by creating and sending traffic in a high number of IPsec sessions through the targeted device. A successful exploit could cause the device to reload and result in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el módulo de programa de cryptography module of the Cisco Adaptive Security Virtual Appliance (ASAv) y Firepower versión 2100 Series que ejecuta Cisco Adaptive Security Appliance (ASA) el programa podría permitir que un atacante remoto no autenticado provoque una recarga inesperada del dispositivo que provoque una condición de denegación de servicio (DoS). La vulnerabilidad se debe a un error lógico en la forma en que el módulo de criptografía del programa maneja las sesiones IPsec. Un atacante podría explotar esta vulnerabilidad creando y enviando tráfico en un gran número de sesiones IPsec a través del dispositivo objetivo. Un exploit con éxito podría causar que el dispositivo se recargue y resulte en una condición de denegación de servicio (DoS)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-327"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.9","versionEndIncluding":"9.9.2.50","matchCriteriaId":"6A250526-6A3F-4C3B-A4DC-078A360924E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5506-x:-:*:*:*:*:*:*:*","matchCriteriaId":"4916B846-AEAD-4C06-9705-048627F27236"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5506h-x:-:*:*:*:*:*:*:*","matchCriteriaId":"931B9C8E-6AD7-4E05-8E48-27D3931DC8BB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5506w-x:-:*:*:*:*:*:*:*","matchCriteriaId":"D78BA13B-49B2-4ECF-A69D-5C14EAB6B118"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5508-x:-:*:*:*:*:*:*:*","matchCriteriaId":"5806FA7C-356B-45BB-ABB0-54B87167AF77"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5516-x:-:*:*:*:*:*:*:*","matchCriteriaId":"93289CFF-6A07-46F2-A2E0-5C43C67E0DCD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5525-x:-:*:*:*:*:*:*:*","matchCriteriaId":"45A11CA4-D93C-4D32-81C7-E3CF71EC4BBB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5545-x:-:*:*:*:*:*:*:*","matchCriteriaId":"0EF47542-3C2E-4BDB-823F-9A901312C634"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5555-x:-:*:*:*:*:*:*:*","matchCriteriaId":"A567EFB6-9A19-4BC0-8EE2-6E2219D09961"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ipsec-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ipsec-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}