8.6

CVE-2020-3407

A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Xe Version15.8(3)m3
   Cisco1100-4g Integrated Services Router Version-
   Cisco1100-4gltegb Integrated Services Router Version-
   Cisco1100-4gltena Integrated Services Router Version-
   Cisco1100-4p Integrated Services Router Version-
   Cisco1100-6g Integrated Services Router Version-
   Cisco1100-8p Integrated Services Router Version-
   Cisco1100-lte Integrated Services Router Version-
   Cisco1100 Integrated Services Router Version-
   Cisco1101-4p Integrated Services Router Version-
   Cisco1101 Integrated Services Router Version-
   Cisco1109-2p Integrated Services Router Version-
   Cisco1109-4p Integrated Services Router Version-
   Cisco1109 Integrated Services Router Version-
   Cisco1111x-8p Integrated Services Router Version-
   Cisco1111x Integrated Services Router Version-
   Cisco111x Integrated Services Router Version-
   Cisco1120 Integrated Services Router Version-
   Cisco1160 Integrated Services Router Version-
   Cisco4221 Integrated Services Router Version-
   Cisco4331 Integrated Services Router Version-
   Cisco4431 Integrated Services Router Version-
   Cisco4451 Integrated Services Router Version-
   Cisco4461 Integrated Services Router Version-
   CiscoAsr 1000-x Version-
   CiscoAsr 1001 Version-
   CiscoAsr 1001-x Version-
   CiscoAsr 1002 Version-
   CiscoAsr 1002-x Version-
   CiscoAsr 1004 Version-
   CiscoAsr 1006 Version-
   CiscoAsr 1013 Version-
   CiscoAsr1001-hx Version-
   CiscoAsr1001-hx-rf Version-
   CiscoAsr1001-x-rf Version-
   CiscoAsr1001-x-ws Version-
   CiscoAsr1002-hx Version-
   CiscoAsr1002-hx-rf Version-
   CiscoAsr1002-hx-ws Version-
   CiscoAsr1002-x-rf Version-
   CiscoAsr1002-x-ws Version-
   CiscoCatalyst 9800-40 Version-
   CiscoCatalyst 9800-80 Version-
   CiscoCatalyst 9800-cl Version-
   CiscoCatalyst 9800-l Version-
   CiscoCatalyst 9800-l-c Version-
   CiscoCatalyst 9800-l-f Version-
   CiscoCatalyst C9200-24p Version-
   CiscoCatalyst C9200-24t Version-
   CiscoCatalyst C9200-48p Version-
   CiscoCatalyst C9200-48t Version-
   CiscoCatalyst C9200l-24p-4g Version-
   CiscoCatalyst C9200l-24p-4x Version-
   CiscoCatalyst C9200l-24pxg-2y Version-
   CiscoCatalyst C9200l-24pxg-4x Version-
   CiscoCatalyst C9200l-24t-4g Version-
   CiscoCatalyst C9200l-24t-4x Version-
   CiscoCatalyst C9200l-48p-4g Version-
   CiscoCatalyst C9200l-48p-4x Version-
   CiscoCatalyst C9200l-48pxg-2y Version-
   CiscoCatalyst C9200l-48pxg-4x Version-
   CiscoCatalyst C9200l-48t-4g Version-
   CiscoCatalyst C9200l-48t-4x Version-
   CiscoCatalyst C9300-24p Version-
   CiscoCatalyst C9300-24s Version-
   CiscoCatalyst C9300-24t Version-
   CiscoCatalyst C9300-24u Version-
   CiscoCatalyst C9300-24ux Version-
   CiscoCatalyst C9300-48p Version-
   CiscoCatalyst C9300-48s Version-
   CiscoCatalyst C9300-48t Version-
   CiscoCatalyst C9300-48u Version-
   CiscoCatalyst C9300-48un Version-
   CiscoCatalyst C9300-48uxm Version-
   CiscoCatalyst C9300l-24p-4g Version-
   CiscoCatalyst C9300l-24p-4x Version-
   CiscoCatalyst C9300l-24t-4g Version-
   CiscoCatalyst C9300l-24t-4x Version-
   CiscoCatalyst C9300l-48p-4g Version-
   CiscoCatalyst C9300l-48p-4x Version-
   CiscoCatalyst C9300l-48t-4g Version-
   CiscoCatalyst C9300l-48t-4x Version-
   CiscoCatalyst C9404r Version-
   CiscoCatalyst C9407r Version-
   CiscoCatalyst C9410r Version-
   CiscoCatalyst C9500-12q Version-
   CiscoCatalyst C9500-16x Version-
   CiscoCatalyst C9500-24q Version-
   CiscoCatalyst C9500-24y4c Version-
   CiscoCatalyst C9500-32c Version-
   CiscoCatalyst C9500-32qc Version-
   CiscoCatalyst C9500-40x Version-
   CiscoCatalyst C9500-48y4c Version-
   CiscoCsr 1000v
   CiscoWs-c3650-12x48uq Version-
   CiscoWs-c3650-12x48ur Version-
   CiscoWs-c3650-12x48uz Version-
   CiscoWs-c3650-24pd Version-
   CiscoWs-c3650-24pdm Version-
   CiscoWs-c3650-24ps Version-
   CiscoWs-c3650-24td Version-
   CiscoWs-c3650-24ts Version-
   CiscoWs-c3650-48fd Version-
   CiscoWs-c3650-48fq Version-
   CiscoWs-c3650-48fqm Version-
   CiscoWs-c3650-48fs Version-
   CiscoWs-c3650-48pd Version-
   CiscoWs-c3650-48pq Version-
   CiscoWs-c3650-48ps Version-
   CiscoWs-c3650-48td Version-
   CiscoWs-c3650-48tq Version-
   CiscoWs-c3650-48ts Version-
   CiscoWs-c3650-8x24uq Version-
   CiscoWs-c3850 Version-
   CiscoWs-c3850-12s Version-
   CiscoWs-c3850-12x48u Version-
   CiscoWs-c3850-12xs Version-
   CiscoWs-c3850-24p Version-
   CiscoWs-c3850-24s Version-
   CiscoWs-c3850-24t Version-
   CiscoWs-c3850-24u Version-
   CiscoWs-c3850-24xs Version-
   CiscoWs-c3850-24xu Version-
   CiscoWs-c3850-48f Version-
   CiscoWs-c3850-48p Version-
   CiscoWs-c3850-48t Version-
   CiscoWs-c3850-48u Version-
   CiscoWs-c3850-48xs Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.26% 0.775
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
nvd@nist.gov 7.1 8.6 6.9
AV:N/AC:M/Au:N/C:N/I:N/A:C
psirt@cisco.com 8.6 3.9 4
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.