CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
76.0%
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition, aka a GET MIB Object ID Denial of Service Vulnerability. The vulnerability is due to a condition that could occur when the affected software processes an SNMP read request that contains a request for the ciscoFlashMIB object ID (OID). An attacker could trigger this vulnerability by issuing an SNMP GET request for the ciscoFlashMIB OID on an affected device. A successful exploit could cause the affected device to restart due to a SYS-3-CPUHOG. This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS Software and are configured to use SNMP Version 2 (SNMPv2) or SNMP Version 3 (SNMPv3): Cisco Catalyst 2960-L Series Switches, Cisco Catalyst Digital Building Series Switches 8P, Cisco Catalyst Digital Building Series Switches 8U. Cisco Bug IDs: CSCvd89541.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ios | 15.2(5)e | cpe:2.3:o:cisco:ios:15.2\(5\)e:*:*:*:*:*:*:* |
cisco | catalyst_2960l-16ps-ll | - | cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-16ts-ll | - | cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-24pq-ll | - | cpe:2.3:h:cisco:catalyst_2960l-24pq-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-24ps-ll | - | cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-24tq-ll | - | cpe:2.3:h:cisco:catalyst_2960l-24tq-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-24ts-ll | - | cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-48pq-ll | - | cpe:2.3:h:cisco:catalyst_2960l-48pq-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-48ps-ll | - | cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:* |
cisco | catalyst_2960l-48tq-ll | - | cpe:2.3:h:cisco:catalyst_2960l-48tq-ll:-:*:*:*:*:*:*:* |
[
{
"product": "Cisco IOS",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco IOS"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
76.0%