Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCE327B4-D5D7-48CD-81CE-2729CA9DC7D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "819DA43C-A5B8-4EEC-B924-727D47477614", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.1.a0:*:*:*:*:*:*:*", "matchCriteriaId": "49787FCE-06CF-4A4E-ACC0-AC83A25B8440", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.1.v0:*:*:*:*:*:*:*", "matchCriteriaId": "8B8F5686-FA3A-43C9-94B8-0F483ADC02FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.m0.62842:*:*:*:*:*:*:*", "matchCriteriaId": "CDE98F06-0B06-4B34-83AF-1678D6E0B2FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.m0.63229:*:*:*:*:*:*:*", "matchCriteriaId": "C228B7E2-07E2-4894-BDE4-BDB2F9B24198", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.v0:*:*:*:*:*:*:*", "matchCriteriaId": "232E0002-C9FE-4E4D-A83D-7BDC6507951B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:asr_5000_series_software:21.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4696D17E-9AD1-4F7F-B560-99A61F46867C", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An IKE Packet Parsing Denial of Service Vulnerability in the ipsecmgr process of Cisco ASR 5000 Software could allow an unauthenticated, remote attacker to cause the ipsecmgr process to reload. More Information: CSCuy06917 CSCuy45036 CSCuy59525. Known Affected Releases: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Known Fixed Releases: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135."}, {"lang": "es", "value": "Una vulnerabilidad de denegaci\u00f3n de servicio del an\u00e1lisis de paquetes IKE en el proceso ipsecmgr del software Cisco ASR 5000 podr\u00eda permitir a un atacante remoto no autenticado provocar que el proceso ipsecmgr se recargue. M\u00e1s informaci\u00f3n: CSCuy06917 CSCuy45036 CSCuy59525. Lanzamientos afectados conocidos: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Lanzamientos fijos conocidos: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135."}], "id": "CVE-2016-9216", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-01-26T07:59:00.137", "references": [{"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/95629"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1037652"}, {"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-asr"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/95629"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037652"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-asr"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}