Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", "matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", "matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", "matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", "matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", "matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", "matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", "matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", "matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", "matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", "matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", "matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", "matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", "matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*", "matchCriteriaId": "97410577-A005-49B6-981C-535B3484E72F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*", "matchCriteriaId": "3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", "matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", "matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", "matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", "matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*", "matchCriteriaId": "9E203E52-0A3A-4910-863D-05FEF537C9B8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*", "matchCriteriaId": "4B6442B5-A87E-493B-98D5-F954B5A001BA", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*", "matchCriteriaId": "8794DA1D-9EE8-4139-B8E9-061A73CFD5F5", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*", "matchCriteriaId": "51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*", "matchCriteriaId": "E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", "matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*", "matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", "matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", "matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*", "matchCriteriaId": "CE3170E3-0BCC-4C5F-8E6C-5E91E8C4E7A8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*", "matchCriteriaId": "3CCDB353-DD15-4C91-AD2A-73649C012E08", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*", "matchCriteriaId": "7D7DAAE1-BB3F-4FBA-A6ED-3BABC9196C1C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD", "vulnerable": true}, {"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*", "matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device's operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device's operating system. This vulnerability affects only Cisco ASR 1000 Series Routers that have removable line cards and Cisco cBR-8 Converged Broadband Routers, if they are running certain Cisco IOS XE 3.16 through 16.5 releases. Cisco Bug IDs: CSCvc65866, CSCve77132."}, {"lang": "es", "value": "Una vulnerabilidad en los puertos de la consola de la placa base de las tarjetas de l\u00ednea para Cisco ASR 1000 Series Aggregation Services Routers y Cisco cBR-8 Converged Broadband Routers podr\u00eda permitir que un atacante f\u00edsico no autenticado acceda al sistema operativo del dispositivo afectado. Existe una vulnerabilidad en la que un puerto de consola est\u00e1 disponible en la placa base de las tarjetas de l\u00ednea afectadas. Un atacante podr\u00eda explotar esta vulnerabilidad conect\u00e1ndose f\u00edsicamente al puerto de consola en la tarjeta de l\u00ednea. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante obtenga acceso total al sistema operativo del dispositivo afectado. Esta vulnerabilidad afecta a los routers de la serie ASR 1000 de Cisco que tienen tarjetas de l\u00ednea extra\u00edbles y routers Cisco cBR-8 Converged Broadband, si ejecutan determinadas distribuciones de Cisco IOS XE desde la 3.16 hasta la 16.5. Cisco Bug IDs: CSCvc65866, CSCve77132."}], "id": "CVE-2017-12239", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-09-29T01:34:49.030", "references": [{"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101042"}, {"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039454"}, {"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039455"}, {"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101042"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039454"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039455"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "psirt@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-798"}], "source": "nvd@nist.gov", "type": "Primary"}]}