Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:3.3\\(.0\\)xo:*:*:*:*:*:*:*", "matchCriteriaId": "B24D4850-4857-4608-8F37-063B05ED18CD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2EB5A06F-59B5-43A1-8D06-1B6BA08630A1", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*", "matchCriteriaId": "FB5F6C44-DB9D-41FD-AD8D-AF45258772DD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*", "matchCriteriaId": "0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(0\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "1F1B438A-7A8C-4538-9BA3-1720AFABBC59", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(1\\)as:*:*:*:*:*:*:*", "matchCriteriaId": "2D27A078-0B81-4A70-9D4B-6C96DC063156", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(2\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "8491E391-CF33-45FE-8AC1-8D8AD4B1097B", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(3\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "B91C6B3E-6631-4298-9405-25073BC311F0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(4\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "A7A9D97A-175A-43C3-9DED-B5AB5F98ACF9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(5\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "A60999F0-CC70-4D00-9DA3-40348F3B9E56", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8\\(0\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "D9B21EA0-95AD-4732-BB53-E9950B795EC9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8\\(1\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "7B103627-6DF4-44E2-88E3-0C5E2EF9275D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8\\(2\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "C7C6D211-D64C-45D9-BC2C-F6B83B689DB9", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9\\(0\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "73313096-6148-4980-99A7-5F69028F5E6F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9\\(1a\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "23F1BC13-D082-4289-B931-58747B541157", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9\\(2\\)s:*:*:*:*:*:*:*", "matchCriteriaId": "D2A61114-1976-4A23-8021-517AC90967EF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s:*:*:*:*:*:*:*", "matchCriteriaId": "62170294-9984-4C61-AFBC-742C6E7CAB31", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The metadata flow feature in Cisco IOS 15.1 through 15.3 and IOS XE 3.3.xXO before 3.3.1XO, 3.6.xS and 3.7.xS before 3.7.6S, and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allows remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCue22753."}, {"lang": "es", "value": "La caracter\u00edstica de flujo de metadatos en Cisco IOS 15.1 hasta 15.3 y IOS XE 3.3.xXO anterior a 3.3.1XO, 3.6.xS y 3.7.xS anterior a 3.7.6S, y 3.8.xS, 3.9.xS, y 3.10.xS anterior a 3.10.1S permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes RSVP malformados, tambi\u00e9n conocido como Bug ID CSCue22753."}], "id": "CVE-2014-3356", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-09-25T10:55:08.497", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata"}, {"source": "psirt@cisco.com", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml"}, {"source": "psirt@cisco.com", "url": "http://www.securityfocus.com/bid/70135"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1030894"}, {"source": "psirt@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96176"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70135"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030894"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96176"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}