Lucene search

K
cve[email protected]CVE-2020-3407
HistorySep 24, 2020 - 6:15 p.m.

CVE-2020-3407

2020-09-2418:15:18
CWE-476
web.nvd.nist.gov
19
cve-2020-3407
vulnerability
cisco
ios xe software
remote attacker
acl
dos
nvd

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.5%

A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Affected configurations

NVD
Node
ciscoios_xeMatch15.8\(3\)m3
AND
cisco1100-4g_integrated_services_routerMatch-
OR
cisco1100-4gltegb_integrated_services_routerMatch-
OR
cisco1100-4gltena_integrated_services_routerMatch-
OR
cisco1100-4p_integrated_services_routerMatch-
OR
cisco1100-6g_integrated_services_routerMatch-
OR
cisco1100-8p_integrated_services_routerMatch-
OR
cisco1100-lte_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco1101-4p_integrated_services_routerMatch-
OR
cisco1101_integrated_services_routerMatch-
OR
cisco1109-2p_integrated_services_routerMatch-
OR
cisco1109-4p_integrated_services_routerMatch-
OR
cisco1109_integrated_services_routerMatch-
OR
cisco1111x-8p_integrated_services_routerMatch-
OR
cisco1111x_integrated_services_routerMatch-
OR
cisco111x_integrated_services_routerMatch-
OR
cisco1120_integrated_services_routerMatch-
OR
cisco1160_integrated_services_routerMatch-
OR
cisco4221_integrated_services_routerMatch-
OR
cisco4331_integrated_services_routerMatch-
OR
cisco4431_integrated_services_routerMatch-
OR
cisco4451_integrated_services_routerMatch-
OR
cisco4461_integrated_services_routerMatch-
OR
ciscoasr_1000-xMatch-
OR
ciscoasr_1001Match-
OR
ciscoasr_1001-xMatch-
OR
ciscoasr_1002Match-
OR
ciscoasr_1002-xMatch-
OR
ciscoasr_1004Match-
OR
ciscoasr_1006Match-
OR
ciscoasr_1013Match-
OR
ciscoasr1001-hxMatch-
OR
ciscoasr1001-hx-rfMatch-
OR
ciscoasr1001-x-rfMatch-
OR
ciscoasr1001-x-wsMatch-
OR
ciscoasr1002-hxMatch-
OR
ciscoasr1002-hx-rfMatch-
OR
ciscoasr1002-hx-wsMatch-
OR
ciscoasr1002-x-rfMatch-
OR
ciscoasr1002-x-wsMatch-
OR
ciscocatalyst_9800-40Match-
OR
ciscocatalyst_9800-80Match-
OR
ciscocatalyst_9800-clMatch-
OR
ciscocatalyst_9800-lMatch-
OR
ciscocatalyst_9800-l-cMatch-
OR
ciscocatalyst_9800-l-fMatch-
OR
ciscocatalyst_c9200-24pMatch-
OR
ciscocatalyst_c9200-24tMatch-
OR
ciscocatalyst_c9200-48pMatch-
OR
ciscocatalyst_c9200-48tMatch-
OR
ciscocatalyst_c9200l-24p-4gMatch-
OR
ciscocatalyst_c9200l-24p-4xMatch-
OR
ciscocatalyst_c9200l-24pxg-2yMatch-
OR
ciscocatalyst_c9200l-24pxg-4xMatch-
OR
ciscocatalyst_c9200l-24t-4gMatch-
OR
ciscocatalyst_c9200l-24t-4xMatch-
OR
ciscocatalyst_c9200l-48p-4gMatch-
OR
ciscocatalyst_c9200l-48p-4xMatch-
OR
ciscocatalyst_c9200l-48pxg-2yMatch-
OR
ciscocatalyst_c9200l-48pxg-4xMatch-
OR
ciscocatalyst_c9200l-48t-4gMatch-
OR
ciscocatalyst_c9200l-48t-4xMatch-
OR
ciscocatalyst_c9300-24pMatch-
OR
ciscocatalyst_c9300-24sMatch-
OR
ciscocatalyst_c9300-24tMatch-
OR
ciscocatalyst_c9300-24uMatch-
OR
ciscocatalyst_c9300-24uxMatch-
OR
ciscocatalyst_c9300-48pMatch-
OR
ciscocatalyst_c9300-48sMatch-
OR
ciscocatalyst_c9300-48tMatch-
OR
ciscocatalyst_c9300-48uMatch-
OR
ciscocatalyst_c9300-48unMatch-
OR
ciscocatalyst_c9300-48uxmMatch-
OR
ciscocatalyst_c9300l-24p-4gMatch-
OR
ciscocatalyst_c9300l-24p-4xMatch-
OR
ciscocatalyst_c9300l-24t-4gMatch-
OR
ciscocatalyst_c9300l-24t-4xMatch-
OR
ciscocatalyst_c9300l-48p-4gMatch-
OR
ciscocatalyst_c9300l-48p-4xMatch-
OR
ciscocatalyst_c9300l-48t-4gMatch-
OR
ciscocatalyst_c9300l-48t-4xMatch-
OR
ciscocatalyst_c9404rMatch-
OR
ciscocatalyst_c9407rMatch-
OR
ciscocatalyst_c9410rMatch-
OR
ciscocatalyst_c9500-12qMatch-
OR
ciscocatalyst_c9500-16xMatch-
OR
ciscocatalyst_c9500-24qMatch-
OR
ciscocatalyst_c9500-24y4cMatch-
OR
ciscocatalyst_c9500-32cMatch-
OR
ciscocatalyst_c9500-32qcMatch-
OR
ciscocatalyst_c9500-40xMatch-
OR
ciscocatalyst_c9500-48y4cMatch-
OR
ciscocsr_1000v
OR
ciscows-c3650-12x48uqMatch-
OR
ciscows-c3650-12x48urMatch-
OR
ciscows-c3650-12x48uzMatch-
OR
ciscows-c3650-24pdMatch-
OR
ciscows-c3650-24pdmMatch-
OR
ciscows-c3650-24psMatch-
OR
ciscows-c3650-24tdMatch-
OR
ciscows-c3650-24tsMatch-
OR
ciscows-c3650-48fdMatch-
OR
ciscows-c3650-48fqMatch-
OR
ciscows-c3650-48fqmMatch-
OR
ciscows-c3650-48fsMatch-
OR
ciscows-c3650-48pdMatch-
OR
ciscows-c3650-48pqMatch-
OR
ciscows-c3650-48psMatch-
OR
ciscows-c3650-48tdMatch-
OR
ciscows-c3650-48tqMatch-
OR
ciscows-c3650-48tsMatch-
OR
ciscows-c3650-8x24uqMatch-
OR
ciscows-c3850Match-
OR
ciscows-c3850-12sMatch-
OR
ciscows-c3850-12x48uMatch-
OR
ciscows-c3850-12xsMatch-
OR
ciscows-c3850-24pMatch-
OR
ciscows-c3850-24sMatch-
OR
ciscows-c3850-24tMatch-
OR
ciscows-c3850-24uMatch-
OR
ciscows-c3850-24xsMatch-
OR
ciscows-c3850-24xuMatch-
OR
ciscows-c3850-48fMatch-
OR
ciscows-c3850-48pMatch-
OR
ciscows-c3850-48tMatch-
OR
ciscows-c3850-48uMatch-
OR
ciscows-c3850-48xsMatch-
CPENameOperatorVersion
cisco:ios_xecisco ios xeeq15.8\(3\)m3

CNA Affected

[
  {
    "product": "Cisco IOS XE Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.5%

Related for CVE-2020-3407