7.4

CVE-2020-3428

A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoIos Xe Version-
   Cisco1100 Integrated Services Router Version-
   Cisco1101 Integrated Services Router Version-
   Cisco1109 Integrated Services Router Version-
   Cisco1111x Integrated Services Router Version-
   Cisco111x Integrated Services Router Version-
   Cisco1120 Integrated Services Router Version-
   Cisco1160 Integrated Services Router Version-
   Cisco4221 Integrated Services Router Version-
   Cisco4321 Integrated Services Router Version-
   Cisco4331 Integrated Services Router Version-
   Cisco4351 Integrated Services Router Version-
   Cisco4431 Integrated Services Router Version-
   Cisco4451-x Integrated Services Router Version-
   Cisco4461 Integrated Services Router Version-
   CiscoAsr 1001-hx Version-
   CiscoAsr 1001-x Version-
   CiscoAsr 1002-hx Version-
   CiscoAsr 1002-x Version-
   CiscoAsr 1004 Version-
   CiscoAsr 1006 Version-
   CiscoAsr 1006-x Version-
   CiscoAsr 1009-x Version-
   CiscoAsr 1013 Version-
   CiscoCatalyst 9800-40 Version-
   CiscoCatalyst 9800-80 Version-
   CiscoCatalyst 9800-cl Version-
   CiscoCatalyst 9800-l Version-
   CiscoCatalyst 9800-l-c Version-
   CiscoCatalyst 9800-l-f Version-
   CiscoCatalyst C9200-24p Version-
   CiscoCatalyst C9200-24t Version-
   CiscoCatalyst C9200-48p Version-
   CiscoCatalyst C9200-48t Version-
   CiscoCatalyst C9200l-24p-4g Version-
   CiscoCatalyst C9200l-24p-4x Version-
   CiscoCatalyst C9200l-24pxg-2y Version-
   CiscoCatalyst C9200l-24pxg-4x Version-
   CiscoCatalyst C9200l-24t-4g Version-
   CiscoCatalyst C9200l-24t-4x Version-
   CiscoCatalyst C9200l-48p-4g Version-
   CiscoCatalyst C9300-24p Version-
   CiscoCatalyst C9300-24s Version-
   CiscoCatalyst C9300-24t Version-
   CiscoCatalyst C9300-24u Version-
   CiscoCatalyst C9300-24ux Version-
   CiscoCatalyst C9300-48p Version-
   CiscoCatalyst C9300-48s Version-
   CiscoCatalyst C9300-48t Version-
   CiscoCatalyst C9300-48u Version-
   CiscoCatalyst C9300-48un Version-
   CiscoCatalyst C9300-48uxm Version-
   CiscoCatalyst C9300l-24p-4g Version-
   CiscoCatalyst C9300l-24p-4x Version-
   CiscoCatalyst C9300l-24t-4g Version-
   CiscoCatalyst C9300l-24t-4x Version-
   CiscoCatalyst C9300l-48p-4g Version-
   CiscoCatalyst C9300l-48p-4x Version-
   CiscoCatalyst C9300l-48t-4g Version-
   CiscoCatalyst C9300l-48t-4x Version-
   CiscoCatalyst C9404r Version-
   CiscoCatalyst C9407r Version-
   CiscoCatalyst C9410r Version-
   CiscoCatalyst C9500-12q Version-
   CiscoCatalyst C9500-16x Version-
   CiscoCatalyst C9500-24q Version-
   CiscoCatalyst C9500-24y4c Version-
   CiscoCatalyst C9500-32c Version-
   CiscoCatalyst C9500-32qc Version-
   CiscoCatalyst C9500-40x Version-
   CiscoCatalyst C9500-48y4c Version-
   CiscoCatalyst C9600 Switch Version-
   CiscoCloud Services Router 1000v Version-
   CiscoIntegrated Services Virtual Router Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.216
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 6.1 6.5 6.9
AV:A/AC:L/Au:N/C:N/I:N/A:C
psirt@cisco.com 7.4 2.8 4
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.