Show plain JSON{"id": "CVE-2019-1700", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.7, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 5.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 6.1, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 1.6}, {"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.0", "baseScore": 6.1, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 1.6}]}, "published": "2019-02-21T21:29:00.313", "references": [{"url": "http://www.securityfocus.com/bid/107105", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}, {"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in field-programmable gate array (FPGA) ingress buffer management for the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. Manual intervention may be required before a device will resume normal operations. The vulnerability is due to a logic error in the FPGA related to the processing of different types of input packets. An attacker could exploit this vulnerability by being on the adjacent subnet and sending a crafted sequence of input packets to a specific interface on an affected device. A successful exploit could allow the attacker to cause a queue wedge condition on the interface. When a wedge occurs, the affected device will stop processing any additional packets that are received on the wedged interface. Version 2.2 is affected."}, {"lang": "es", "value": "Una vulnerabilidad en la gesti\u00f3n de un b\u00fafer de entrada FPGA (field-programmable gate array) para la serie Firepower 9000 de Cisco con el m\u00f3dulo de red de doble anchura \"Firepower 2-port 100G\" de Cisco (PID: FPR9K-DNM-2X100G) podr\u00eda permitir a un atacante adyacente no autenticado provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Se podr\u00eda requerir intervenci\u00f3n manual antes de que un dispositivo reanude su operativa normal. La vulnerabilidad se debe a un error de l\u00f3gica en el FPGA relacionado con el procesamiento de diferentes tipos de paquetes de entradas. Un ataque podr\u00eda explotar esta vulnerabilidad posicion\u00e1ndose en la subred adyacente y enviando una secuencia manipulada de paquetes de entradas a una determinada interfaz en el dispositivo afectado. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante provoque una condici\u00f3n de cola de la interfaz se acu\u00f1e. Cuando se acu\u00f1a una cola de la interfaz, el dispositivo afectado dejar\u00e1 de procesar cualquier paquete adicional que se reciba en la interfaz \"acu\u00f1ada\". La versi\u00f3n 2.2 se ve afectada."}], "lastModified": "2019-10-09T23:47:45.720", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_9000_firmware:2.2\\(200.8\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55060C01-837D-416F-8E04-C8EF1569CC2B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_9000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7E183F2B-3565-49BC-B591-4BFC2ABC35B7"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}