{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T05:15:45.466","vulnerabilities":[{"cve":{"id":"CVE-2019-1760","sourceIdentifier":"psirt@cisco.com","published":"2019-03-28T01:29:00.533","lastModified":"2024-11-21T04:37:18.470","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Performance Routing Version 3 (PfRv3) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload. The vulnerability is due to the processing of malformed smart probe packets. An attacker could exploit this vulnerability by sending specially crafted smart probe packets at the affected device. A successful exploit could allow the attacker to reload the device, resulting in a denial of service (DoS) attack on an affected system."},{"lang":"es","value":"Una vulnerabilidad en Performance Routing Version 3 (PfRv3) del software Cisco IOS XE podría permitir que un atacante remoto no autenticado provoque que el dispositivo afectado se recargue. Esta vulnerabilidad se debe a un procesamiento incorrecto de paquetes \"smart probe\" mal formados. Un atacante podría explotar esta vulnerabilidad enviando paquetes \"smart probe\" especialmente manipulados al dispositivo afectado. Su explotación con éxito podría permitir que el atacante recargue el dispositivo, provocando una denegación de servicio (DoS) en un sistema afectado."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*","matchCriteriaId":"52BC2A87-31EC-4E15-86E3-ECBEFA9E479A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*","matchCriteriaId":"5D136C95-F837-49AD-82B3-81C25F68D0EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*","matchCriteriaId":"C35B3F96-B342-4AFC-A511-7A735B961ECD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*","matchCriteriaId":"9E203E52-0A3A-4910-863D-05FEF537C9B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*","matchCriteriaId":"DED2D791-4142-4B9E-8401-6B63357536B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*","matchCriteriaId":"4B6442B5-A87E-493B-98D5-F954B5A001BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*","matchCriteriaId":"8794DA1D-9EE8-4139-B8E9-061A73CFD5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*","matchCriteriaId":"9FBEF4B2-EA12-445A-823E-E0E5343A405E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*","matchCriteriaId":"51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*","matchCriteriaId":"E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*","matchCriteriaId":"844E7CEC-5CB6-47AE-95F7-75693347C08E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*","matchCriteriaId":"E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*","matchCriteriaId":"147A245E-9A5D-4178-A1AC-5B0D41C3B730"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*","matchCriteriaId":"169D71B3-1CCE-4526-8D91-048212EEDF08"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*","matchCriteriaId":"27F66514-B9C4-422E-B68E-406608302E03"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*","matchCriteriaId":"E2438157-4D9C-4E16-9D2A-759A8F6CDDE2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*","matchCriteriaId":"283971DD-DD58-4A76-AC2A-F316534ED416"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*","matchCriteriaId":"A8F324A5-4830-482E-A684-AB3B6594CEAE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*","matchCriteriaId":"E8120196-8648-49D0-8262-CD4C9C90C37A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*","matchCriteriaId":"33E7CCE2-C685-4019-9B55-B3BECB3E5F76"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*","matchCriteriaId":"0699DD6E-BA74-4814-93AB-300329C9D032"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*","matchCriteriaId":"C2E2D781-2684-45F1-AC52-636572A0DCA8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*","matchCriteriaId":"77E8AF15-AB46-4EAB-8872-8C55E8601599"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*","matchCriteriaId":"957318BE-55D4-4585-AA52-C813301D01C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*","matchCriteriaId":"8F11B703-8A0F-47ED-AA70-951FF78B94A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*","matchCriteriaId":"FE7B2557-821D-4E05-B5C3-67192573D97D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*","matchCriteriaId":"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*","matchCriteriaId":"187F699A-AF2F-42B0-B855-27413140C384"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*","matchCriteriaId":"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*","matchCriteriaId":"62EDEC28-661E-42EF-88F0-F62D0220D2E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*","matchCriteriaId":"F821EBD7-91E2-4460-BFAF-18482CF6CB8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*","matchCriteriaId":"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*","matchCriteriaId":"C9B825E6-5929-4890-BDBA-4CF4BD2314C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*","matchCriteriaId":"623BF701-ADC9-4F24-93C5-043A6A7FEF5F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*","matchCriteriaId":"E5311FBE-12BF-41AC-B8C6-D86007834863"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*","matchCriteriaId":"52FB055E-72F9-4CB7-A51D-BF096BD1A55D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*","matchCriteriaId":"57D4F634-03D5-4D9F-901C-7E9CE45F2F38"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*","matchCriteriaId":"4463A1D1-E169-4F0B-91B2-FA126BB444CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*","matchCriteriaId":"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDD58C58-1B0C-4A71-8C02-F555CEF9C253"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*","matchCriteriaId":"5C9C585C-A6EC-4385-B915-046C110BF95F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/107611","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pfrv3","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/107611","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pfrv3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}