Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "C69CD0D0-DFF3-4D14-8DB2-9D6A2FBAFDFB", "versionEndIncluding": "3.4.3s", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C798B993-8521-4C5D-88AF-2D509DBAC2AF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "127BD97D-56A0-4B75-9A19-CC499965B53D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4A1D6AEB-26F3-4BD9-A4CA-3D54CCF158F8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "87B35652-621F-48DB-84FF-E214D42AA799", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E216416-E3ED-437D-A725-2297DD86EF3C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3E8F3444-17E3-48A5-BEC1-97967F7E4EA3", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "539E369A-299B-4CDE-940F-C853E08439B2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "39120E68-F456-4035-8B28-64943CDDCFD2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*", "matchCriteriaId": "57F6EF3B-2F31-4449-9B2A-9114D41BBC6A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1E6D907-4B38-4046-BF4F-C7DFA36F55E4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B52CA-3834-4435-A3E1-9684A41E6405", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "5976253B-339F-49C3-A538-653901E85EFA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "838C42B4-6D72-4EE5-A0F0-87E60D73A44A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB06F1BF-E186-48EA-BAE2-1B76DB16BC3C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "6ECECC55-C937-45B7-ABC9-1DA44D1DBED8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "23AD1406-D2E4-4517-BF3E-A87C1FA8AC7E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D203439-1A4B-4805-8A15-5A33C612A5B4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2DC46EA-C766-4EBA-B686-29B3B23F0155", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "71A41531-FBC0-41DD-9965-8CAFA30488AE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "310BA9E3-8175-4220-9FC3-48390C994174", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B837418-4855-44BE-BA6F-0840864481A4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*", "matchCriteriaId": "C5A13401-2660-483E-89A5-6420B5866BB8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*", "matchCriteriaId": "77FC74E2-2510-40F5-BB2B-11608B844E28", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*", "matchCriteriaId": "3C69E845-700C-4250-B528-9482A5362F61", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*", "matchCriteriaId": "389D6E60-F6AB-40B8-B894-CE97BF13AE63", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*", "matchCriteriaId": "1A40EA0A-1642-4950-9943-20C1888C18D5", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", "matchCriteriaId": "B45225F2-C9EB-493D-B845-64BFB8DBB89B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", "matchCriteriaId": "252377A3-7F15-45F2-A169-BBC37858D4DA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*", "matchCriteriaId": "85908754-8426-49D3-BCC2-AF174B5D0EF8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", "matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED7C321E-F083-4AB6-96A0-D6358980441E", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4376E56-A21C-4642-A85D-439C8E21CD7F", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EAE214D-8DD8-4DA3-872A-609E7CE6E606", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "matchCriteriaId": "55DD2272-10C2-43B9-9F13-6DC41DBE179B", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "matchCriteriaId": "7428E0A8-1641-47FB-9CA9-34311DEF660D", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "399C03D1-C4B2-4DE6-9772-EC0BD88D7FCF", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cisco IOS XE 2.x and 3.x before 3.4.5S, and 3.5 through 3.7 before 3.7.1S, on 1000 series Aggregation Services Routers (ASR) allows remote attackers to cause a denial of service (card reload) by sending many crafted L2TP packets, aka Bug ID CSCtz23293."}, {"lang": "es", "value": "Cisco IOS XE v2.x y v3.x antes de v3.4.5S, y v3.5 hasta v3.7 antes de v3.7.1S, en la serie routers 1000 de agregaci\u00f3n (ASR) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de la tarjeta), enviando muchos paquetes manipulados L2TP, tambi\u00e9n conocido como Bug ID CSCtz23293."}], "id": "CVE-2013-1165", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-04-11T10:55:01.890", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asr1000"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}