Lucene search

K
cve[email protected]CVE-2020-3235
HistoryJun 03, 2020 - 6:15 p.m.

CVE-2020-3235

2020-06-0318:15:21
CWE-118
CWE-20
web.nvd.nist.gov
41
cisco
ios software
ios xe software
catalyst 4500 series
snmp
vulnerability
dos
nvd
cve-2020-3235

6.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:N/I:N/A:C

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.8%

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.

Affected configurations

NVD
Node
ciscoiosMatch12.2\(52\)sg
OR
ciscoiosMatch12.2\(53\)sg1
OR
ciscoiosMatch12.2\(53\)sg2
OR
ciscoiosMatch12.2\(53\)sg3
OR
ciscoiosMatch12.2\(53\)sg4
OR
ciscoiosMatch12.2\(53\)sg5
OR
ciscoiosMatch12.2\(53\)sg6
OR
ciscoiosMatch12.2\(53\)sg7
OR
ciscoiosMatch12.2\(53\)sg8
OR
ciscoiosMatch12.2\(53\)sg9
OR
ciscoiosMatch12.2\(53\)sg10
OR
ciscoiosMatch12.2\(53\)sg11
OR
ciscoiosMatch12.2\(54\)sg
OR
ciscoiosMatch12.2\(54\)sg1
OR
ciscoiosMatch12.2\(54\)wo
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(1\)xo
OR
ciscoiosMatch15.0\(1\)xo1
OR
ciscoiosMatch15.0\(2\)ex2
OR
ciscoiosMatch15.0\(2\)ex8
OR
ciscoiosMatch15.0\(2\)sg
OR
ciscoiosMatch15.0\(2\)sg1
OR
ciscoiosMatch15.0\(2\)sg2
OR
ciscoiosMatch15.0\(2\)sg3
OR
ciscoiosMatch15.0\(2\)sg4
OR
ciscoiosMatch15.0\(2\)sg5
OR
ciscoiosMatch15.0\(2\)sg6
OR
ciscoiosMatch15.0\(2\)sg7
OR
ciscoiosMatch15.0\(2\)sg8
OR
ciscoiosMatch15.0\(2\)sg9
OR
ciscoiosMatch15.0\(2\)sg10
OR
ciscoiosMatch15.0\(2\)sg11
OR
ciscoiosMatch15.0\(2\)xo
OR
ciscoiosMatch15.1\(1\)sg
OR
ciscoiosMatch15.1\(1\)sg1
OR
ciscoiosMatch15.1\(1\)sg2
OR
ciscoiosMatch15.1\(2\)sg
OR
ciscoiosMatch15.1\(2\)sg1
OR
ciscoiosMatch15.1\(2\)sg2
OR
ciscoiosMatch15.1\(2\)sg3
OR
ciscoiosMatch15.1\(2\)sg4
OR
ciscoiosMatch15.1\(2\)sg5
OR
ciscoiosMatch15.1\(2\)sg6
OR
ciscoiosMatch15.1\(2\)sg7
OR
ciscoiosMatch15.1\(2\)sg8
OR
ciscoiosMatch15.2\(1\)e
OR
ciscoiosMatch15.2\(1\)e1
OR
ciscoiosMatch15.2\(1\)e3
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2\)e3
OR
ciscoiosMatch15.2\(2\)e4
OR
ciscoiosMatch15.2\(2\)e5
OR
ciscoiosMatch15.2\(2\)e5a
OR
ciscoiosMatch15.2\(2\)e5b
OR
ciscoiosMatch15.2\(2\)e6
OR
ciscoiosMatch15.2\(2\)e7
OR
ciscoiosMatch15.2\(2\)e7b
OR
ciscoiosMatch15.2\(2\)e8
OR
ciscoiosMatch15.2\(2\)e9
OR
ciscoiosMatch15.2\(2\)e9a
OR
ciscoiosMatch15.2\(2\)e10
OR
ciscoiosMatch15.2\(2b\)e
OR
ciscoiosMatch15.2\(3\)e
OR
ciscoiosMatch15.2\(3\)e1
OR
ciscoiosMatch15.2\(3\)e2
OR
ciscoiosMatch15.2\(3\)e3
OR
ciscoiosMatch15.2\(3\)e4
OR
ciscoiosMatch15.2\(3\)e5
OR
ciscoiosMatch15.2\(4\)e
OR
ciscoiosMatch15.2\(4\)e1
OR
ciscoiosMatch15.2\(4\)e2
OR
ciscoiosMatch15.2\(4\)e3
OR
ciscoiosMatch15.2\(4\)e4
OR
ciscoiosMatch15.2\(4\)e5
OR
ciscoiosMatch15.2\(4\)e5a
OR
ciscoiosMatch15.2\(4\)e6
OR
ciscoiosMatch15.2\(4\)e7
OR
ciscoiosMatch15.2\(4\)e8
OR
ciscoiosMatch15.3\(3\)jpj
OR
ciscoios_xeMatch3.2.0sg
OR
ciscoios_xeMatch3.2.1sg
OR
ciscoios_xeMatch3.2.2sg
OR
ciscoios_xeMatch3.2.3sg
OR
ciscoios_xeMatch3.2.4sg
OR
ciscoios_xeMatch3.2.5sg
OR
ciscoios_xeMatch3.2.6sg
OR
ciscoios_xeMatch3.2.7sg
OR
ciscoios_xeMatch3.2.8sg
OR
ciscoios_xeMatch3.2.9sg
OR
ciscoios_xeMatch3.2.10sg
OR
ciscoios_xeMatch3.2.11sg
OR
ciscoios_xeMatch3.3.0sg
OR
ciscoios_xeMatch3.3.0xo
OR
ciscoios_xeMatch3.3.1sg
OR
ciscoios_xeMatch3.3.1xo
OR
ciscoios_xeMatch3.3.2sg
OR
ciscoios_xeMatch3.3.2xo
OR
ciscoios_xeMatch3.4.0sg
OR
ciscoios_xeMatch3.4.1sg
OR
ciscoios_xeMatch3.4.2sg
OR
ciscoios_xeMatch3.4.3sg
OR
ciscoios_xeMatch3.4.4sg
OR
ciscoios_xeMatch3.4.5sg
OR
ciscoios_xeMatch3.4.6sg
OR
ciscoios_xeMatch3.4.7sg
OR
ciscoios_xeMatch3.4.8sg
OR
ciscoios_xeMatch3.5.0e
OR
ciscoios_xeMatch3.5.1e
OR
ciscoios_xeMatch3.5.2e
OR
ciscoios_xeMatch3.5.3e
OR
ciscoios_xeMatch3.6.0be
OR
ciscoios_xeMatch3.6.0e
OR
ciscoios_xeMatch3.6.1e
OR
ciscoios_xeMatch3.6.3e
OR
ciscoios_xeMatch3.6.4e
OR
ciscoios_xeMatch3.6.5ae
OR
ciscoios_xeMatch3.6.5be
OR
ciscoios_xeMatch3.6.5e
OR
ciscoios_xeMatch3.6.6e
OR
ciscoios_xeMatch3.6.7e
OR
ciscoios_xeMatch3.6.8e
OR
ciscoios_xeMatch3.6.9e
OR
ciscoios_xeMatch3.6.10e
OR
ciscoios_xeMatch3.7.0e
OR
ciscoios_xeMatch3.7.1e
OR
ciscoios_xeMatch3.7.2e
OR
ciscoios_xeMatch3.7.3e
OR
ciscoios_xeMatch3.8.0e
OR
ciscoios_xeMatch3.8.1e
OR
ciscoios_xeMatch3.8.2e
OR
ciscoios_xeMatch3.8.3e
OR
ciscoios_xeMatch3.8.4e
OR
ciscoios_xeMatch3.8.5ae
OR
ciscoios_xeMatch3.8.5e
OR
ciscoios_xeMatch3.8.6e
OR
ciscoios_xeMatch3.8.7e
OR
ciscoios_xeMatch3.8.8e
OR
ciscoios_xeMatch3.9.0e
OR
ciscoios_xeMatch3.9.1e
OR
ciscoios_xeMatch3.9.2be
OR
ciscoios_xeMatch3.9.2e
OR
ciscoios_xeMatch3.10.0ce
OR
ciscoios_xeMatch3.10.0e
OR
ciscoios_xeMatch3.10.1ae
OR
ciscoios_xeMatch3.10.1e
OR
ciscoios_xeMatch3.10.1se
OR
ciscoios_xeMatch3.10.2e
AND
ciscocatalyst_4503-e
OR
ciscocatalyst_4506-eMatch-
OR
ciscocatalyst_4507r\+eMatch-
OR
ciscocatalyst_4510r\+eMatch-
Node
oraclegoldengate_management_packMatch12.2.1.2.0

CNA Affected

[
  {
    "product": "Cisco IOS 12.2(53)SG1",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

6.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:N/I:N/A:C

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.8%