Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB41294E-F3DF-4F1E-A4C8-E90B21A88836", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2AB6A02-B7C7-48D1-8857-BD1CDF9A40D8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B870F917-9F35-41AE-8CCA-D8574189C7EC", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*", "matchCriteriaId": "BEF8A6EC-3C45-4CDB-81B5-4D50CD5C4087", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*", "matchCriteriaId": "737D7668-872C-4246-9AB9-12FF059E231A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*", "matchCriteriaId": "D4CBDA4F-DBB3-4426-8C16-2B2314ACF21D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*", "matchCriteriaId": "41E237F6-97DA-45AE-8505-B3F629AB026D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3s\\(.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF78C82D-B8A9-47F6-983B-4F315024981D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3s\\(.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BE97CB97-258C-40DD-8596-1BBD70FF0AC4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.3s\\(.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6DD097AB-515E-4F59-9BE1-EABC05B65661", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", "matchCriteriaId": "5872A42F-745E-4EC6-8679-C28F79F6621C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*", "matchCriteriaId": "86947E54-A1B9-4ECE-92A6-417462249612", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*", "matchCriteriaId": "A862D914-CE60-48A9-9D52-299642BE3FF6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s\\(.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "E585F9A7-3693-44EF-BBF9-9EA0EBCC1526", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s\\(.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "414646EA-063D-41F4-8EA9-4B69559EE700", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.5s\\(.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B3BC6AA-59AA-473F-99BC-30A91553A204", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", "matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", "matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", "matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s\\(.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "274A45E0-F556-4AFB-9050-BE99DE308206", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7s\\(.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "34F50A18-1849-4205-A553-3F16CDA39850", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B79934A-7B54-46F7-AD4F-C7756D647633", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D50BF2F7-363D-434C-8F5E-0D05F93E99BF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8s\\(.2\\):*:*:*:*:*:*:*", "matchCriteriaId": "84435710-504F-4838-A488-FB1218D5111F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", "matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", "matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1A10EA18-B637-4792-A3CB-E29705893148", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", "matchCriteriaId": "D9D9F45C-E71F-4425-A0C7-DFFEEC93C152", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", "matchCriteriaId": "26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s1:*:*:*:*:*:*:*", "matchCriteriaId": "1610738B-DA92-4368-868C-F8DD6C7DC0E4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cisco IOS 15.1 through 15.3 and IOS XE 3.3 and 3.5 before 3.5.2E; 3.7 before 3.7.5S; and 3.8, 3.9, and 3.10 before 3.10.2S allow remote attackers to cause a denial of service (I/O memory consumption and device reload) via a malformed IPv6 packet, aka Bug ID CSCui59540."}, {"lang": "es", "value": "Cisco IOS 15.1 hasta 15.3 y IOS XE 3.3 y 3.5 anterior a 3.5.2E; 3.7 anterior a 3.7.5S y 3.8, 3.9 y 3.10 anterior a 3.10.2S permiten a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria de E/S y reinicio de dispositivo) a trav\u00e9s de un paquete IPv6 malformado, tambi\u00e9n conocido como Bug ID CSCui59540."}], "id": "CVE-2014-2113", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-03-27T21:55:09.110", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6"}, {"source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/66467"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66467"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}