{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T16:25:38.587","vulnerabilities":[{"cve":{"id":"CVE-2019-1964","sourceIdentifier":"psirt@cisco.com","published":"2019-08-28T19:15:10.973","lastModified":"2024-11-21T04:37:46.927","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device."},{"lang":"es","value":"Una vulnerabilidad en el procesamiento del tráfico IPv6 del software Cisco NX-OS podría permitir que un atacante remoto no identificado provoque un reinicio inesperado del proceso de netstack en un dispositivo afectado. La vulnerabilidad se debe a una validación incorrecta del tráfico IPv6 enviado a través de un dispositivo afectado. Un atacante podría aprovechar esta vulnerabilidad enviando un paquete IPv6 con formato incorrecto a través de un dispositivo afectado. Una explotación con éxito  podría permitir al atacante causar una condición de denegación de servicio (DoS) mientras se reinicia el proceso netstack. Un ataque sostenido podría provocar un reinicio del dispositivo."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1","versionEndExcluding":"8.2\\(3\\)","matchCriteriaId":"E6688A39-ABF0-4A32-B4AD-5B5C7C201658"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.3","versionEndExcluding":"8.4","matchCriteriaId":"75DC5389-9D4E-42B6-857E-86BFCA2B47BF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7000_10-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"489A59F2-D44D-44ED-844C-E0EF83A23C4F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7000_18-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"79689D81-D8F0-4FB1-9B8F-62407474A042"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7000_4-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"BBA5F539-E8AC-44B5-9E9C-2E35F6CAA22E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7000_9-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"D01E7A7E-7111-4C89-8EBD-080B0A3E069C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7700_10-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"ADCDCAC9-30F2-4EE3-9D02-5AA8BA6A1E99"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7700_18-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"610E21F4-8188-4B5E-A80F-CFE0F2B9D8A6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7700_2-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"83003054-E458-4405-BA7F-A5EA415D296A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:7700_6-slot:-:*:*:*:*:*:*:*","matchCriteriaId":"C7610AAC-D1FE-44A8-9925-31F1CCA8AFEF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:*","matchCriteriaId":"F58B1C42-9150-48C9-9203-A2466FC61261"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:*","matchCriteriaId":"0AD5DA69-09D9-436A-8FC1-A46626DE2789"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:*","matchCriteriaId":"E0A9CD4D-4659-402D-BDF8-E5EF86449641"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:*","matchCriteriaId":"5C9DC24E-6B6E-496C-8D8C-09B197B0A77E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*","matchCriteriaId":"9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:*","matchCriteriaId":"9D753638-4BE8-4BF5-A083-F8360003869D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*","matchCriteriaId":"8E6AC35C-29B2-42C7-862D-D9AC3461D8D6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:*","matchCriteriaId":"C4FD83D1-8ECB-4DB8-A6E0-2F795F83B4CF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:*","matchCriteriaId":"9B875911-E742-427B-AE07-C8A5955DEA62"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:*","matchCriteriaId":"CD0C6431-8EB1-4F69-AF28-8F5C55348AF5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:*","matchCriteriaId":"AFCA5EC7-9F36-4473-B0DF-4F0F9C680F10"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:*","matchCriteriaId":"5D0E31D5-9F1D-46EC-824F-352A0098944B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:*","matchCriteriaId":"E8AD0767-C42B-4BAC-B90C-F4412B661D7A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*","matchCriteriaId":"B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*","matchCriteriaId":"D409BDF3-9F35-4D94-9DF0-7B58A519A005"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*","matchCriteriaId":"993AFE99-DFC3-4D92-90C8-D3A6495547BC"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*","matchCriteriaId":"7453E0FA-B05D-4888-AFB0-8FE8B8040DFC"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*","matchCriteriaId":"108DB6B5-CB29-477F-84FC-52116F295878"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*","matchCriteriaId":"4FBB9435-1CD4-469E-BF16-AD98ADC99AAB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*","matchCriteriaId":"42ABB93D-2C3A-4029-B545-B638B6C7788E"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}