{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:06:25.684","vulnerabilities":[{"cve":{"id":"CVE-2019-5613","sourceIdentifier":"secteam@freebsd.org","published":"2020-02-18T16:15:11.173","lastModified":"2024-11-21T04:45:14.303","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In FreeBSD 12.0-RELEASE before 12.0-RELEASE-p13, a missing check in the ipsec packet processor allows reinjection of an old packet to be accepted by the ipsec endpoint. Depending on the higher-level protocol in use over ipsec, this could allow an action to be repeated."},{"lang":"es","value":"En FreeBSD versiones 12.0-RELEASE anteriores a 12.0-RELEASE-p13, una falta de comprobación en el procesador de paquetes ipsec, permite que una reinyección de un paquete antiguo sea aceptada por parte del endpoint de ipsec. Dependiendo del protocolo de nivel superior en uso mediante ipsec, esto podría permitir una acción sea repetida."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*","matchCriteriaId":"826B53C2-517F-4FC6-92E8-E7FCB24F91B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*","matchCriteriaId":"93F10A46-AEF2-4FDD-92D6-0CF07B70F986"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p10:*:*:*:*:*:*","matchCriteriaId":"8C7B8FCA-2170-469A-B6D6-2C6AB254F20F"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p11:*:*:*:*:*:*","matchCriteriaId":"E94067A1-5C68-4401-A7B6-29B4FE553733"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p12:*:*:*:*:*:*","matchCriteriaId":"87EE567B-7604-41CC-B0A7-B51255D4C240"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*","matchCriteriaId":"E1AD57A9-F53A-4E40-966E-F2F50852C5E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*","matchCriteriaId":"C4029113-130F-4A33-A8A0-BC3E74000378"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*","matchCriteriaId":"46C5A6FD-7BBF-4E84-9895-8EE14DC846E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p6:*:*:*:*:*:*","matchCriteriaId":"882669AB-BCFC-4517-A3E9-33D344F1ED0D"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p7:*:*:*:*:*:*","matchCriteriaId":"BC3D24FB-50A2-4E37-A479-AF21F8ECD706"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p8:*:*:*:*:*:*","matchCriteriaId":"3070787D-76E1-4671-B99D-213F7103B3A2"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p9:*:*:*:*:*:*","matchCriteriaId":"0140276F-9C31-4B5C-A5AC-DE0EBB885275"}]}]}],"references":[{"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:02.ipsec.asc","source":"secteam@freebsd.org","tags":["Patch","Vendor Advisory"]},{"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:02.ipsec.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}