Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-1760

A vulnerability in Performance Routing Version 3 (PfRv3) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload. The vulnerability is due to the processing of malformed smart probe packets. An attacker could exploit this vulnerability by sending specially crafted smart probe packets at the affected device. A successful exploit could allow the attacker to reload the device, resulting in a denial of service (DoS) attack on an affected system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 62.4%
CVSS Severity
CVSS v3 Score 6.8
CVSS v2 Score 7.1
Products affected by CVE-2019-1760
  • Cisco » Ios Xe » Version: 16.3.2
    cpe:2.3:o:cisco:ios_xe:16.3.2
  • Cisco » Ios Xe » Version: 16.3.3
    cpe:2.3:o:cisco:ios_xe:16.3.3
  • Cisco » Ios Xe » Version: 16.3.4
    cpe:2.3:o:cisco:ios_xe:16.3.4
  • Cisco » Ios Xe » Version: 16.3.5
    cpe:2.3:o:cisco:ios_xe:16.3.5
  • Cisco » Ios Xe » Version: 16.3.5b
    cpe:2.3:o:cisco:ios_xe:16.3.5b
  • Cisco » Ios Xe » Version: 16.3.6
    cpe:2.3:o:cisco:ios_xe:16.3.6
  • Cisco » Ios Xe » Version: 16.4.1
    cpe:2.3:o:cisco:ios_xe:16.4.1
  • Cisco » Ios Xe » Version: 16.4.2
    cpe:2.3:o:cisco:ios_xe:16.4.2
  • Cisco » Ios Xe » Version: 16.4.3
    cpe:2.3:o:cisco:ios_xe:16.4.3
  • Cisco » Ios Xe » Version: 16.5.1
    cpe:2.3:o:cisco:ios_xe:16.5.1
  • Cisco » Ios Xe » Version: 16.5.1a
    cpe:2.3:o:cisco:ios_xe:16.5.1a
  • Cisco » Ios Xe » Version: 16.5.1b
    cpe:2.3:o:cisco:ios_xe:16.5.1b
  • Cisco » Ios Xe » Version: 16.5.2
    cpe:2.3:o:cisco:ios_xe:16.5.2
  • Cisco » Ios Xe » Version: 16.5.3
    cpe:2.3:o:cisco:ios_xe:16.5.3
  • Cisco » Ios Xe » Version: 16.6.1
    cpe:2.3:o:cisco:ios_xe:16.6.1
  • Cisco » Ios Xe » Version: 16.6.2
    cpe:2.3:o:cisco:ios_xe:16.6.2
  • Cisco » Ios Xe » Version: 16.6.3
    cpe:2.3:o:cisco:ios_xe:16.6.3
  • Cisco » Ios Xe » Version: 16.7.1
    cpe:2.3:o:cisco:ios_xe:16.7.1
  • Cisco » Ios Xe » Version: 16.7.1a
    cpe:2.3:o:cisco:ios_xe:16.7.1a
  • Cisco » Ios Xe » Version: 16.7.1b
    cpe:2.3:o:cisco:ios_xe:16.7.1b
  • Cisco » Ios Xe » Version: 16.8.1
    cpe:2.3:o:cisco:ios_xe:16.8.1
  • Cisco » Ios Xe » Version: 16.8.1a
    cpe:2.3:o:cisco:ios_xe:16.8.1a
  • Cisco » Ios Xe » Version: 16.8.1b
    cpe:2.3:o:cisco:ios_xe:16.8.1b
  • Cisco » Ios Xe » Version: 16.8.1c
    cpe:2.3:o:cisco:ios_xe:16.8.1c
  • Cisco » Ios Xe » Version: 16.8.1s
    cpe:2.3:o:cisco:ios_xe:16.8.1s
  • Cisco » Ios Xe » Version: 3.16.4as
    cpe:2.3:o:cisco:ios_xe:3.16.4as
  • Cisco » Ios Xe » Version: 3.16.4bs
    cpe:2.3:o:cisco:ios_xe:3.16.4bs
  • Cisco » Ios Xe » Version: 3.16.4cs
    cpe:2.3:o:cisco:ios_xe:3.16.4cs
  • Cisco » Ios Xe » Version: 3.16.4ds
    cpe:2.3:o:cisco:ios_xe:3.16.4ds
  • Cisco » Ios Xe » Version: 3.16.4es
    cpe:2.3:o:cisco:ios_xe:3.16.4es
  • Cisco » Ios Xe » Version: 3.16.4gs
    cpe:2.3:o:cisco:ios_xe:3.16.4gs
  • Cisco » Ios Xe » Version: 3.16.4s
    cpe:2.3:o:cisco:ios_xe:3.16.4s
  • Cisco » Ios Xe » Version: 3.16.5as
    cpe:2.3:o:cisco:ios_xe:3.16.5as
  • Cisco » Ios Xe » Version: 3.16.5bs
    cpe:2.3:o:cisco:ios_xe:3.16.5bs
  • Cisco » Ios Xe » Version: 3.16.5s
    cpe:2.3:o:cisco:ios_xe:3.16.5s
  • Cisco » Ios Xe » Version: 3.16.6bs
    cpe:2.3:o:cisco:ios_xe:3.16.6bs
  • Cisco » Ios Xe » Version: 3.16.6s
    cpe:2.3:o:cisco:ios_xe:3.16.6s
  • Cisco » Ios Xe » Version: 3.16.7as
    cpe:2.3:o:cisco:ios_xe:3.16.7as
  • Cisco » Ios Xe » Version: 3.16.7bs
    cpe:2.3:o:cisco:ios_xe:3.16.7bs
  • Cisco » Ios Xe » Version: 3.16.7s
    cpe:2.3:o:cisco:ios_xe:3.16.7s
  • Cisco » Ios Xe » Version: 3.2.0ja
    cpe:2.3:o:cisco:ios_xe:3.2.0ja


Contact Us

Shodan ® - All rights reserved