Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE398278-79E8-4043-9ED3-735775213587", "versionEndIncluding": "a3\\(2.0\\)", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:ace_4710:a3\\(1.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F3BDA08-1786-46AD-93B3-C374BE1AC949", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:application_control_engine_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "19E93539-6D77-4D1E-BF77-C35EE2170D4B", "versionEndIncluding": "a2\\(1.2\\)", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:application_control_engine_module:a2\\(1.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C5EDC4AB-2D1B-4233-A260-9D5521057F09", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst:6500:*:*:*:*:*:*:*", "matchCriteriaId": "712DA93A-13CE-4E27-84FC-D2ECEEFFD568", "vulnerable": false}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst:7600:*:*:*:*:*:*:*", "matchCriteriaId": "521A4FD3-18E3-4937-A6AD-F7BDB3DB08ED", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet."}, {"lang": "es", "value": "Vulnerabilidad no especificada en \"Cisco ACE Application Control Engine Module\" para Catalyst 6500 Switches y 7600 Routers anteriores A2(1.3) y Cisco ACE 4710 Application Control Engine Appliance anteriores a A3(2.1) que permite a los atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s de un paquete SSH manipulado."}], "id": "CVE-2009-0623", "lastModified": "2024-11-21T01:00:32.720", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-02-26T16:17:20.170", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml"}, {"source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/33900"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33900"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}