8.6
CVE-2020-3228
- EPSS 1.64%
- Published 03.06.2020 18:15:20
- Last modified 21.11.2024 05:30:36
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Nx-os Version8.0(1)
Cisco ≫ Nexus 7000 10-slot Version-
Cisco ≫ Nexus 7000 18-slot Version-
Cisco ≫ Nexus 7000 4-slot Version-
Cisco ≫ Nexus 7000 9-slot Version-
Cisco ≫ Nexus 7000 18-slot Version-
Cisco ≫ Nexus 7000 4-slot Version-
Cisco ≫ Nexus 7000 9-slot Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.64% | 0.814 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
psirt@cisco.com | 6.8 | 2.2 | 4 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.