CVE-2019-1751

A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
ciscoCNA
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
VendorProductVersion
ciscoios
15.4\(1\)cg1
ciscoios
15.4\(1\)t
ciscoios
15.4\(1\)t1
ciscoios
15.4\(1\)t2
ciscoios
15.4\(1\)t3
ciscoios
15.4\(1\)t4
ciscoios
15.4\(2\)t
ciscoios
15.4\(2\)t1
ciscoios
15.4\(2\)t2
ciscoios
15.4\(2\)t3
ciscoios
15.4\(2\)t4
ciscoios
15.4\(3\)m
ciscoios
15.4\(3\)m1
ciscoios
15.4\(3\)m2
ciscoios
15.4\(3\)m3
ciscoios
15.4\(3\)m4
ciscoios
15.4\(3\)m5
ciscoios
15.4\(3\)m6
ciscoios
15.4\(3\)m6a
ciscoios
15.4\(3\)m7
ciscoios
15.4\(3\)m7a
ciscoios
15.4\(3\)m8
ciscoios
15.4\(3\)m9
ciscoios
15.4\(3\)m10
ciscoios
15.5\(1\)t
ciscoios
15.5\(1\)t1
ciscoios
15.5\(1\)t2
ciscoios
15.5\(1\)t3
ciscoios
15.5\(1\)t4
ciscoios
15.5\(2\)t
ciscoios
15.5\(2\)t1
ciscoios
15.5\(2\)t2
ciscoios
15.5\(2\)t3
ciscoios
15.5\(2\)t4
ciscoios
15.5\(2\)xb
ciscoios
15.5\(3\)m
ciscoios
15.5\(3\)m0a
ciscoios
15.5\(3\)m1
ciscoios
15.5\(3\)m2
ciscoios
15.5\(3\)m2a
ciscoios
15.5\(3\)m3
ciscoios
15.5\(3\)m4
ciscoios
15.5\(3\)m4a
ciscoios
15.5\(3\)m4b
ciscoios
15.5\(3\)m4c
ciscoios
15.5\(3\)m5
ciscoios
15.5\(3\)m5a
ciscoios
15.5\(3\)m6
ciscoios
15.5\(3\)m6a
ciscoios
15.5\(3\)m7
ciscoios
15.5\(3\)m8
ciscoios
15.6\(1\)t
ciscoios
15.6\(1\)t0a
ciscoios
15.6\(1\)t1
ciscoios
15.6\(1\)t2
ciscoios
15.6\(1\)t3
ciscoios
15.6\(2\)t
ciscoios
15.6\(2\)t0a
ciscoios
15.6\(2\)t1
ciscoios
15.6\(2\)t2
ciscoios
15.6\(2\)t3
ciscoios
15.6\(3\)m
ciscoios
15.6\(3\)m0a
ciscoios
15.6\(3\)m1
ciscoios
15.6\(3\)m1a
ciscoios
15.6\(3\)m1b
ciscoios
15.6\(3\)m2
ciscoios
15.6\(3\)m2a
ciscoios
15.6\(3\)m3
ciscoios
15.6\(3\)m3a
ciscoios
15.6\(3\)m4
ciscoios
15.6\(3\)m5
ciscoios
15.7\(3\)m
ciscoios
15.7\(3\)m0a
ciscoios
15.7\(3\)m1
ciscoios
15.7\(3\)m2
ciscoios
15.7\(3\)m3
ciscoios
15.8\(3\)m
ciscoios
15.8\(3\)m0a
ciscoios
15.8\(3\)m0b
𝑥
= Vulnerable software versions