{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T02:11:28.745","vulnerabilities":[{"cve":{"id":"CVE-2019-1708","sourceIdentifier":"psirt@cisco.com","published":"2019-05-03T16:29:00.680","lastModified":"2024-11-21T04:37:08.910","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Internet Key Exchange Version 2 Mobility and Multihoming Protocol (MOBIKE) feature for the Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to the incorrect processing of certain MOBIKE packets. An attacker could exploit this vulnerability by sending crafted MOBIKE packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition. The MOBIKE feature is supported only for IPv4 addresses."},{"lang":"es","value":"Una vulnerabilidad en la característica del Internet Key Exchange Version 2 Mobility and Multihoming Protocol (MOBIKE) (Cisco Mobility) para el programa ASA (Cisco Adaptive Security Appliance) y el programa Cisco Firepower Threat Defense (FTD) podría permitir que un atacante remoto no autenticado provoque una pérdida de memoria o recarga de un dispositivo afectado que lleva a una condición de denegación de servicio (DoS). La vulnerabilidad se debe al procesamiento inapropiado de ciertos paquetes MOBIKE. Un atacante podría explotar esta vulnerabilidad enviando paquetes MOBIKE creados a un dispositivo afectado para procesarlos. Una explotación con éxito podría hacer que un dispositivo afectado consumiera memoria continuamente y finalmente se recargara, resultando en una condición DoS. La función MOBIKE solo es compatible con direcciones IPv4."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.2","versionEndIncluding":"6.2.3.12","matchCriteriaId":"660EA1E6-E045-47EA-81D9-6B7199129B20"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.0","versionEndIncluding":"6.3.0.3","matchCriteriaId":"20F76E4C-C428-4360-89B5-CD23332D7878"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.8","versionEndIncluding":"9.8.4","matchCriteriaId":"730A1D46-E66F-440A-B756-007C73BF97A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.9","versionEndIncluding":"9.9.2.50","matchCriteriaId":"6A250526-6A3F-4C3B-A4DC-078A360924E9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.10","versionEndIncluding":"9.10.1.17","matchCriteriaId":"E4DDEA4A-D45F-4AE0-82AB-2FB75E9A344D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5506-x:-:*:*:*:*:*:*:*","matchCriteriaId":"4916B846-AEAD-4C06-9705-048627F27236"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5525-x:-:*:*:*:*:*:*:*","matchCriteriaId":"45A11CA4-D93C-4D32-81C7-E3CF71EC4BBB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa-5555-x:-:*:*:*:*:*:*:*","matchCriteriaId":"A567EFB6-9A19-4BC0-8EE2-6E2219D09961"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*","matchCriteriaId":"30AC6907-3091-409F-967D-64A82A0C5A8C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*","matchCriteriaId":"D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*","matchCriteriaId":"92AE506A-E710-465B-B795-470FDE0E0ECA"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*","matchCriteriaId":"1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*","matchCriteriaId":"57179F60-E330-4FF0-9664-B1E4637FF210"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/108166","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-ike-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/108166","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-ike-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}