{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T00:30:18.645","vulnerabilities":[{"cve":{"id":"CVE-2019-1846","sourceIdentifier":"psirt@cisco.com","published":"2019-05-16T02:29:00.437","lastModified":"2024-11-21T04:37:31.273","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Multiprotocol Label Switching (MPLS) Operations, Administration, and Maintenance (OAM) implementation of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to the incorrect handling of certain MPLS OAM packets. An attacker could exploit this vulnerability by sending malicious MPLS OAM packets to an affected device. A successful exploit could allow the attacker to cause the lspv_server process to crash. The crash could lead to system instability and the inability to process or forward traffic though the device, resulting in a DoS condition that require manual intervention to restore normal operating conditions."},{"lang":"es","value":"Una vulnerabilidad en Multiprotocol Label Switching (MPLS) Operations, Administration, and Maintenance (OAM) implementation of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, podría permitir que un atacante adyacente sin autorización active una condición de Denegación de Servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido al manejo incorrecto de ciertos paquetes OAM de MPLS. Un atacante podría explotar esta vulnerabilidad enviando paquetes MPLS OAM maliciosos a un dispositivo afectado. Una explotación exito  podría permitir al atacante causar el bloqueo del proceso lspv_server. el bloqueo podría provocar la inestabilidad del sistema y la incapacidad de procesar o reenviar el tráfico por medio del dispositivo, resultando en una condición DoS que requiere de la intervención manual para restablecer las condiciones normales de operación."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:N/A:C","baseScore":6.1,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.5,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:5.3.3:sp10:*:*:*:*:*:*","matchCriteriaId":"29539C29-8282-4C0F-A3A7-B3FD823DDEC0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*","matchCriteriaId":"71BD158E-71D8-4DCA-8C09-F8AB7EF0EBDD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*","matchCriteriaId":"324C97E6-1810-404F-9F45-6240F99FF039"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*","matchCriteriaId":"57EB55BB-41B7-40A1-B6F5-142FE8AB4C16"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*","matchCriteriaId":"433F4A82-04A4-4EAA-8C19-F7581DCD8D29"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*","matchCriteriaId":"2D5E60AB-94FF-448A-89D8-5D2197E21C74"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*","matchCriteriaId":"A93212A4-50AB-42E7-89A4-5FBBAEA050C3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*","matchCriteriaId":"EDA53A61-98B3-458C-8893-61CD7D6B1E48"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*","matchCriteriaId":"F396564E-B477-4A27-A189-CEB737552E25"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*","matchCriteriaId":"5445CC54-ACFB-4070-AF26-F91FEAA85181"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*","matchCriteriaId":"D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/108363","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-asr9k-mpls-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/108363","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-asr9k-mpls-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}