8.1

CVE-2020-3475

Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to gain unauthorized read access to sensitive data or cause the web management software to hang or crash, resulting in a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Version-
   Cisco1100 Integrated Services Router Version-
   Cisco1101 Integrated Services Router Version-
   Cisco1109 Integrated Services Router Version-
   Cisco1111x Integrated Services Router Version-
   Cisco111x Integrated Services Router Version-
   Cisco1120 Integrated Services Router Version-
   Cisco1160 Integrated Services Router Version-
   CiscoAsr 1001-hx Version-
   CiscoAsr 1001-x Version-
   CiscoAsr 1002-hx Version-
   CiscoAsr 1002-x Version-
   CiscoAsr 1004 Version-
   CiscoAsr 1006 Version-
   CiscoAsr 1006-x Version-
   CiscoAsr 1009-x Version-
   CiscoAsr 1013 Version-
   CiscoCatalyst 9800-40 Version-
   CiscoCatalyst 9800-80 Version-
   CiscoCatalyst 9800-cl Version-
   CiscoCatalyst 9800-l Version-
   CiscoCatalyst 9800-l-c Version-
   CiscoCatalyst 9800-l-f Version-
   CiscoCatalyst C9200-24p Version-
   CiscoCatalyst C9200-24t Version-
   CiscoCatalyst C9200-48p Version-
   CiscoCatalyst C9200-48t Version-
   CiscoCatalyst C9200l-24p-4g Version-
   CiscoCatalyst C9200l-24p-4x Version-
   CiscoCatalyst C9200l-24pxg-2y Version-
   CiscoCatalyst C9200l-24pxg-4x Version-
   CiscoCatalyst C9200l-24t-4g Version-
   CiscoCatalyst C9200l-24t-4x Version-
   CiscoCatalyst C9200l-48p-4g Version-
   CiscoCatalyst C9200l-48p-4x Version-
   CiscoCatalyst C9200l-48pxg-2y Version-
   CiscoCatalyst C9200l-48pxg-4x Version-
   CiscoCatalyst C9200l-48t-4g Version-
   CiscoCatalyst C9200l-48t-4x Version-
   CiscoCatalyst C9300-24p Version-
   CiscoCatalyst C9300-24s Version-
   CiscoCatalyst C9300-24t Version-
   CiscoCatalyst C9300-24u Version-
   CiscoCatalyst C9300-24ux Version-
   CiscoCatalyst C9300-48p Version-
   CiscoCatalyst C9300-48s Version-
   CiscoCatalyst C9300-48t Version-
   CiscoCatalyst C9300-48u Version-
   CiscoCatalyst C9300-48un Version-
   CiscoCatalyst C9300-48uxm Version-
   CiscoCatalyst C9300l-24p-4g Version-
   CiscoCatalyst C9300l-24p-4x Version-
   CiscoCatalyst C9300l-24t-4g Version-
   CiscoCatalyst C9300l-24t-4x Version-
   CiscoCatalyst C9300l-48p-4g Version-
   CiscoCatalyst C9300l-48p-4x Version-
   CiscoCatalyst C9300l-48t-4g Version-
   CiscoCatalyst C9300l-48t-4x Version-
   CiscoCatalyst C9500-12q Version-
   CiscoCatalyst C9500-16x Version-
   CiscoCatalyst C9500-24q Version-
   CiscoCatalyst C9500-24y4c Version-
   CiscoCatalyst C9500-32c Version-
   CiscoCatalyst C9500-32qc Version-
   CiscoCatalyst C9500-40x Version-
   CiscoCatalyst C9500-48y4c Version-
   CiscoWs-c3650-12x48uq Version-
   CiscoWs-c3650-12x48ur Version-
   CiscoWs-c3650-12x48uz Version-
   CiscoWs-c3650-24pd Version-
   CiscoWs-c3650-24pdm Version-
   CiscoWs-c3650-24ps Version-
   CiscoWs-c3650-24td Version-
   CiscoWs-c3650-24ts Version-
   CiscoWs-c3650-48fd Version-
   CiscoWs-c3650-48fq Version-
   CiscoWs-c3650-48fqm Version-
   CiscoWs-c3650-48fs Version-
   CiscoWs-c3650-48pd Version-
   CiscoWs-c3650-48pq Version-
   CiscoWs-c3650-48ps Version-
   CiscoWs-c3650-48td Version-
   CiscoWs-c3650-48tq Version-
   CiscoWs-c3650-48ts Version-
   CiscoWs-c3650-8x24uq Version-
   CiscoWs-c3850 Version-
   CiscoWs-c3850-12s Version-
   CiscoWs-c3850-12x48u Version-
   CiscoWs-c3850-12xs Version-
   CiscoWs-c3850-24p Version-
   CiscoWs-c3850-24s Version-
   CiscoWs-c3850-24t Version-
   CiscoWs-c3850-24u Version-
   CiscoWs-c3850-24xs Version-
   CiscoWs-c3850-24xu Version-
   CiscoWs-c3850-48f Version-
   CiscoWs-c3850-48p Version-
   CiscoWs-c3850-48t Version-
   CiscoWs-c3850-48u Version-
   CiscoWs-c3850-48xs Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.22% 0.443
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
nvd@nist.gov 5.5 8 4.9
AV:N/AC:L/Au:S/C:P/I:N/A:P
psirt@cisco.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.