Show plain JSON{"id": "CVE-2014-3356", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-09-25T10:55:08.497", "references": [{"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata", "tags": ["Vendor Advisory"], "source": "psirt@cisco.com"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml", "source": "psirt@cisco.com"}, {"url": "http://www.securityfocus.com/bid/70135", "source": "psirt@cisco.com"}, {"url": "http://www.securitytracker.com/id/1030894", "source": "psirt@cisco.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96176", "source": "psirt@cisco.com"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/70135", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1030894", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96176", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "The metadata flow feature in Cisco IOS 15.1 through 15.3 and IOS XE 3.3.xXO before 3.3.1XO, 3.6.xS and 3.7.xS before 3.7.6S, and 3.8.xS, 3.9.xS, and 3.10.xS before 3.10.1S allows remote attackers to cause a denial of service (device reload) via malformed RSVP packets, aka Bug ID CSCue22753."}, {"lang": "es", "value": "La caracter\u00edstica de flujo de metadatos en Cisco IOS 15.1 hasta 15.3 y IOS XE 3.3.xXO anterior a 3.3.1XO, 3.6.xS y 3.7.xS anterior a 3.7.6S, y 3.8.xS, 3.9.xS, y 3.10.xS anterior a 3.10.1S permite a atacantes remotos causar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de paquetes RSVP malformados, tambi\u00e9n conocido como Bug ID CSCue22753."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:3.3\\(.0\\)xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B24D4850-4857-4608-8F37-063B05ED18CD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EB5A06F-59B5-43A1-8D06-1B6BA08630A1"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB5F6C44-DB9D-41FD-AD8D-AF45258772DD"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(0\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F1B438A-7A8C-4538-9BA3-1720AFABBC59"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(1\\)as:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D27A078-0B81-4A70-9D4B-6C96DC063156"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(2\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8491E391-CF33-45FE-8AC1-8D8AD4B1097B"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(3\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B91C6B3E-6631-4298-9405-25073BC311F0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(4\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7A9D97A-175A-43C3-9DED-B5AB5F98ACF9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.7\\(5\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A60999F0-CC70-4D00-9DA3-40348F3B9E56"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8\\(0\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9B21EA0-95AD-4732-BB53-E9950B795EC9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8\\(1\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B103627-6DF4-44E2-88E3-0C5E2EF9275D"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.8\\(2\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7C6D211-D64C-45D9-BC2C-F6B83B689DB9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9\\(0\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73313096-6148-4980-99A7-5F69028F5E6F"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9\\(1a\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23F1BC13-D082-4289-B931-58747B541157"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.9\\(2\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2A61114-1976-4A23-8021-517AC90967EF"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:3.10s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62170294-9984-4C61-AFBC-742C6E7CAB31"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@cisco.com"}