Vulnerability Details CVE-2019-12663
A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.0%
CVSS Severity
CVSS v3 Score 6.8
CVSS v2 Score 7.8
Products affected by CVE-2019-12663
-
cpe:2.3:h:cisco:catalyst_9300-24p-a:-
-
cpe:2.3:h:cisco:catalyst_9300-24p-e:-
-
cpe:2.3:h:cisco:catalyst_9300-24s-a:-
-
cpe:2.3:h:cisco:catalyst_9300-24s-e:-
-
cpe:2.3:h:cisco:catalyst_9300-24t-a:-
-
cpe:2.3:h:cisco:catalyst_9300-24t-e:-
-
cpe:2.3:h:cisco:catalyst_9300-24u-a:-
-
cpe:2.3:h:cisco:catalyst_9300-24u-e:-
-
cpe:2.3:h:cisco:catalyst_9300-24ux-a:-
-
cpe:2.3:h:cisco:catalyst_9300-24ux-e:-
-
cpe:2.3:h:cisco:catalyst_9300-48p-a:-
-
cpe:2.3:h:cisco:catalyst_9300-48p-e:-
-
cpe:2.3:h:cisco:catalyst_9300-48s-a:-
-
cpe:2.3:h:cisco:catalyst_9300-48s-e:-
-
cpe:2.3:h:cisco:catalyst_9300-48t-a:-
-
cpe:2.3:h:cisco:catalyst_9300-48t-e:-
-
cpe:2.3:h:cisco:catalyst_9300-48u-a:-
-
cpe:2.3:h:cisco:catalyst_9300-48u-e:-
-
cpe:2.3:h:cisco:catalyst_9300-48un-a:-
-
cpe:2.3:h:cisco:catalyst_9300-48un-e:-
-
cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-
-
cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-
-
cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-
-
cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-
-
cpe:2.3:h:cisco:catalyst_9300l_stack:-
-
cpe:2.3:h:cisco:catalyst_c9500-12q-a:-
-
cpe:2.3:h:cisco:catalyst_c9500-12q-e:-
-
cpe:2.3:h:cisco:catalyst_c9500-16x-a:-
-
cpe:2.3:h:cisco:catalyst_c9500-16x-e:-
-
cpe:2.3:h:cisco:catalyst_c9500-24q-a:-
-
cpe:2.3:h:cisco:catalyst_c9500-24q-e:-
-
cpe:2.3:h:cisco:catalyst_c9500-40x-a:-
-
cpe:2.3:h:cisco:catalyst_c9500-40x-e:-
-
cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-
-
cpe:2.3:o:cisco:ios_xe:16.12.1
-
cpe:2.3:o:cisco:ios_xe:16.6.4