Lucene search

K
cve[email protected]CVE-2023-20027
HistoryMar 23, 2023 - 5:15 p.m.

CVE-2023-20027

2023-03-2317:15:13
CWE-416
web.nvd.nist.gov
81
cisco
ios xe
software
ipv4
vfr
dos
vulnerability
cve-2023-20027

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.4%

A vulnerability in the implementation of the IPv4 Virtual Fragmentation Reassembly (VFR) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper reassembly of large packets that occurs when VFR is enabled on either a tunnel interface or on a physical interface that is configured with a maximum transmission unit (MTU) greater than 4,615 bytes. An attacker could exploit this vulnerability by sending fragmented packets through a VFR-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Affected configurations

NVD
Node
ciscoios_xeMatch3.9.0as
OR
ciscoios_xeMatch3.9.1s
OR
ciscoios_xeMatch3.9.2s
OR
ciscoios_xeMatch3.10.0s
OR
ciscoios_xeMatch3.10.1s
OR
ciscoios_xeMatch3.10.2as
OR
ciscoios_xeMatch3.10.2s
OR
ciscoios_xeMatch3.10.2ts
OR
ciscoios_xeMatch3.10.3s
OR
ciscoios_xeMatch3.10.4s
OR
ciscoios_xeMatch3.10.5s
OR
ciscoios_xeMatch3.10.6s
OR
ciscoios_xeMatch3.10.7s
OR
ciscoios_xeMatch3.10.8as
OR
ciscoios_xeMatch3.10.8s
OR
ciscoios_xeMatch3.10.9s
OR
ciscoios_xeMatch3.10.10s
OR
ciscoios_xeMatch3.11.0s
OR
ciscoios_xeMatch3.11.1s
OR
ciscoios_xeMatch3.11.2s
OR
ciscoios_xeMatch3.11.3s
OR
ciscoios_xeMatch3.11.4s
OR
ciscoios_xeMatch3.12.0s
OR
ciscoios_xeMatch3.12.1s
OR
ciscoios_xeMatch3.12.2s
OR
ciscoios_xeMatch3.12.3s
OR
ciscoios_xeMatch3.12.4s
OR
ciscoios_xeMatch3.13.0s
OR
ciscoios_xeMatch3.13.1s
OR
ciscoios_xeMatch3.13.2s
OR
ciscoios_xeMatch3.13.3s
OR
ciscoios_xeMatch3.13.4s
OR
ciscoios_xeMatch3.13.5s
OR
ciscoios_xeMatch3.13.6as
OR
ciscoios_xeMatch3.13.6s
OR
ciscoios_xeMatch3.13.7s
OR
ciscoios_xeMatch3.13.8s
OR
ciscoios_xeMatch3.13.9s
OR
ciscoios_xeMatch3.13.10s
OR
ciscoios_xeMatch3.14.0s
OR
ciscoios_xeMatch3.14.1s
OR
ciscoios_xeMatch3.14.2s
OR
ciscoios_xeMatch3.14.3s
OR
ciscoios_xeMatch3.14.4s
OR
ciscoios_xeMatch3.15.0s
OR
ciscoios_xeMatch3.15.1cs
OR
ciscoios_xeMatch3.15.1s
OR
ciscoios_xeMatch3.15.2s
OR
ciscoios_xeMatch3.15.3s
OR
ciscoios_xeMatch3.15.4s
OR
ciscoios_xeMatch3.16.0cs
OR
ciscoios_xeMatch3.16.0s
OR
ciscoios_xeMatch3.16.1as
OR
ciscoios_xeMatch3.16.2s
OR
ciscoios_xeMatch3.16.3s
OR
ciscoios_xeMatch3.16.4as
OR
ciscoios_xeMatch3.16.4bs
OR
ciscoios_xeMatch3.16.4cs
OR
ciscoios_xeMatch3.16.4ds
OR
ciscoios_xeMatch3.16.4es
OR
ciscoios_xeMatch3.16.4gs
OR
ciscoios_xeMatch3.16.5as
OR
ciscoios_xeMatch3.16.5bs
OR
ciscoios_xeMatch3.16.5s
OR
ciscoios_xeMatch3.16.6bs
OR
ciscoios_xeMatch3.16.6s
OR
ciscoios_xeMatch3.16.7as
OR
ciscoios_xeMatch3.16.7bs
OR
ciscoios_xeMatch3.16.7s
OR
ciscoios_xeMatch3.16.8s
OR
ciscoios_xeMatch3.16.9s
OR
ciscoios_xeMatch3.16.10s
OR
ciscoios_xeMatch3.17.0s
OR
ciscoios_xeMatch3.17.1s
OR
ciscoios_xeMatch3.17.2s
OR
ciscoios_xeMatch3.17.3s
OR
ciscoios_xeMatch3.17.4s
OR
ciscoios_xeMatch3.18.0as
OR
ciscoios_xeMatch3.18.2asp
OR
ciscoios_xeMatch16.2.1
OR
ciscoios_xeMatch16.2.2
OR
ciscoios_xeMatch16.3.1
OR
ciscoios_xeMatch16.3.1a
OR
ciscoios_xeMatch16.3.2
OR
ciscoios_xeMatch16.3.3
OR
ciscoios_xeMatch16.3.4
OR
ciscoios_xeMatch16.3.5
OR
ciscoios_xeMatch16.3.6
OR
ciscoios_xeMatch16.3.7
OR
ciscoios_xeMatch16.3.8
OR
ciscoios_xeMatch16.3.9
OR
ciscoios_xeMatch16.3.10
OR
ciscoios_xeMatch16.3.11
OR
ciscoios_xeMatch16.4.1
OR
ciscoios_xeMatch16.4.2
OR
ciscoios_xeMatch16.4.3
OR
ciscoios_xeMatch16.5.1
OR
ciscoios_xeMatch16.5.1b
OR
ciscoios_xeMatch16.5.2
OR
ciscoios_xeMatch16.5.3
OR
ciscoios_xeMatch16.6.1
OR
ciscoios_xeMatch16.6.2
OR
ciscoios_xeMatch16.6.3
OR
ciscoios_xeMatch16.6.4
OR
ciscoios_xeMatch16.6.4s
OR
ciscoios_xeMatch16.6.5
OR
ciscoios_xeMatch16.6.6
OR
ciscoios_xeMatch16.6.7
OR
ciscoios_xeMatch16.6.8
OR
ciscoios_xeMatch16.6.9
OR
ciscoios_xeMatch16.6.10
OR
ciscoios_xeMatch16.7.1
OR
ciscoios_xeMatch16.7.2
OR
ciscoios_xeMatch16.7.3
OR
ciscoios_xeMatch16.8.1
OR
ciscoios_xeMatch16.8.1s
OR
ciscoios_xeMatch16.8.2
OR
ciscoios_xeMatch16.8.3
OR
ciscoios_xeMatch16.9.1
OR
ciscoios_xeMatch16.9.1s
OR
ciscoios_xeMatch16.9.2
OR
ciscoios_xeMatch16.9.2s
OR
ciscoios_xeMatch16.9.3
OR
ciscoios_xeMatch16.9.3s
OR
ciscoios_xeMatch16.9.4
OR
ciscoios_xeMatch16.9.5
OR
ciscoios_xeMatch16.9.6
OR
ciscoios_xeMatch16.9.7
OR
ciscoios_xeMatch16.9.8
OR
ciscoios_xeMatch16.9.8a
OR
ciscoios_xeMatch16.9.8c
OR
ciscoios_xeMatch16.10.1
OR
ciscoios_xeMatch16.10.1a
OR
ciscoios_xeMatch16.10.1b
OR
ciscoios_xeMatch16.10.1e
OR
ciscoios_xeMatch16.10.1s
OR
ciscoios_xeMatch16.10.2
OR
ciscoios_xeMatch16.10.3
OR
ciscoios_xeMatch16.11.1
OR
ciscoios_xeMatch16.11.1a
OR
ciscoios_xeMatch16.11.1c
OR
ciscoios_xeMatch16.11.1s
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1a
OR
ciscoios_xeMatch16.12.1c
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.2
OR
ciscoios_xeMatch16.12.2s
OR
ciscoios_xeMatch16.12.2t
OR
ciscoios_xeMatch16.12.3
OR
ciscoios_xeMatch16.12.3s
OR
ciscoios_xeMatch16.12.4
OR
ciscoios_xeMatch16.12.5
OR
ciscoios_xeMatch16.12.6
OR
ciscoios_xeMatch16.12.7
OR
ciscoios_xeMatch16.12.8
OR
ciscoios_xeMatch17.1.1
OR
ciscoios_xeMatch17.1.1s
OR
ciscoios_xeMatch17.1.1t
OR
ciscoios_xeMatch17.1.2
OR
ciscoios_xeMatch17.1.3
OR
ciscoios_xeMatch17.2.1
OR
ciscoios_xeMatch17.2.1r
OR
ciscoios_xeMatch17.2.1v
OR
ciscoios_xeMatch17.2.2
OR
ciscoios_xeMatch17.2.3
OR
ciscoios_xeMatch17.3.1
OR
ciscoios_xeMatch17.3.1a
OR
ciscoios_xeMatch17.3.2
OR
ciscoios_xeMatch17.3.3
OR
ciscoios_xeMatch17.3.4
OR
ciscoios_xeMatch17.3.4a
OR
ciscoios_xeMatch17.3.5
OR
ciscoios_xeMatch17.4.1
OR
ciscoios_xeMatch17.4.1a
OR
ciscoios_xeMatch17.4.1b
OR
ciscoios_xeMatch17.4.2
OR
ciscoios_xeMatch17.5.1
OR
ciscoios_xeMatch17.5.1a
OR
ciscoios_xeMatch17.6.1
OR
ciscoios_xeMatch17.6.1a
OR
ciscoios_xeMatch17.6.2
OR
ciscoios_xeMatch17.6.3
OR
ciscoios_xeMatch17.6.3a
OR
ciscoios_xeMatch17.7.1
OR
ciscoios_xeMatch17.7.1a
OR
ciscoios_xeMatch17.7.2
OR
ciscoios_xeMatch17.8.1
OR
ciscoios_xeMatch17.8.1a
AND
ciscocatalyst_8000v_edgeMatch-
OR
ciscocloud_services_router_1000vMatch-
OR
cisco1000_integrated_services_routerMatch-
OR
cisco1100-4g\/6g_integrated_services_routerMatch-
OR
cisco1100-4g_integrated_services_routerMatch-
OR
cisco1100-4p_integrated_services_routerMatch-
OR
cisco1100-6g_integrated_services_routerMatch-
OR
cisco1100-8p_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco1101-4p_integrated_services_routerMatch-
OR
cisco1101_integrated_services_routerMatch-
OR
cisco1109-2p_integrated_services_routerMatch-
OR
cisco1109-4p_integrated_services_routerMatch-
OR
cisco1109_integrated_services_routerMatch-
OR
cisco1111x-8p_integrated_services_routerMatch-
OR
cisco1111x_integrated_services_routerMatch-
OR
cisco111x_integrated_services_routerMatch-
OR
cisco1120_integrated_services_routerMatch-
OR
cisco1131_integrated_services_routerMatch-
OR
cisco1160_integrated_services_routerMatch-
OR
cisco4221_integrated_services_routerMatch-
OR
cisco4321_integrated_services_routerMatch-
OR
cisco4331_integrated_services_routerMatch-
OR
cisco4351_integrated_services_routerMatch-
OR
cisco4431_integrated_services_routerMatch-
OR
cisco4451-x_integrated_services_routerMatch-
OR
cisco4461_integrated_services_routerMatch-
OR
ciscoc8200-1n-4tMatch-
OR
ciscoc8200l-1n-4tMatch-
OR
ciscoc8500l-8s4xMatch-
OR
ciscocatalyst_8300-1n1s-4t2xMatch-
OR
ciscocatalyst_8300-1n1s-6tMatch-
OR
ciscocatalyst_8300-2n2s-4t2xMatch-
OR
ciscocatalyst_8300-2n2s-6tMatch-

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software ",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.4%

Related for CVE-2023-20027