fkie_cve-2020-3235
Vulnerability from fkie_nvd
Published
2020-06-03 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.2\(52\)sg | |
cisco | ios | 12.2\(53\)sg1 | |
cisco | ios | 12.2\(53\)sg2 | |
cisco | ios | 12.2\(53\)sg3 | |
cisco | ios | 12.2\(53\)sg4 | |
cisco | ios | 12.2\(53\)sg5 | |
cisco | ios | 12.2\(53\)sg6 | |
cisco | ios | 12.2\(53\)sg7 | |
cisco | ios | 12.2\(53\)sg8 | |
cisco | ios | 12.2\(53\)sg9 | |
cisco | ios | 12.2\(53\)sg10 | |
cisco | ios | 12.2\(53\)sg11 | |
cisco | ios | 12.2\(54\)sg | |
cisco | ios | 12.2\(54\)sg1 | |
cisco | ios | 12.2\(54\)wo | |
cisco | ios | 15.0\(1\)ey | |
cisco | ios | 15.0\(1\)ey2 | |
cisco | ios | 15.0\(1\)xo | |
cisco | ios | 15.0\(1\)xo1 | |
cisco | ios | 15.0\(2\)ex2 | |
cisco | ios | 15.0\(2\)ex8 | |
cisco | ios | 15.0\(2\)sg | |
cisco | ios | 15.0\(2\)sg1 | |
cisco | ios | 15.0\(2\)sg2 | |
cisco | ios | 15.0\(2\)sg3 | |
cisco | ios | 15.0\(2\)sg4 | |
cisco | ios | 15.0\(2\)sg5 | |
cisco | ios | 15.0\(2\)sg6 | |
cisco | ios | 15.0\(2\)sg7 | |
cisco | ios | 15.0\(2\)sg8 | |
cisco | ios | 15.0\(2\)sg9 | |
cisco | ios | 15.0\(2\)sg10 | |
cisco | ios | 15.0\(2\)sg11 | |
cisco | ios | 15.0\(2\)xo | |
cisco | ios | 15.1\(1\)sg | |
cisco | ios | 15.1\(1\)sg1 | |
cisco | ios | 15.1\(1\)sg2 | |
cisco | ios | 15.1\(2\)sg | |
cisco | ios | 15.1\(2\)sg1 | |
cisco | ios | 15.1\(2\)sg2 | |
cisco | ios | 15.1\(2\)sg3 | |
cisco | ios | 15.1\(2\)sg4 | |
cisco | ios | 15.1\(2\)sg5 | |
cisco | ios | 15.1\(2\)sg6 | |
cisco | ios | 15.1\(2\)sg7 | |
cisco | ios | 15.1\(2\)sg8 | |
cisco | ios | 15.2\(1\)e | |
cisco | ios | 15.2\(1\)e1 | |
cisco | ios | 15.2\(1\)e3 | |
cisco | ios | 15.2\(2\)e | |
cisco | ios | 15.2\(2\)e1 | |
cisco | ios | 15.2\(2\)e2 | |
cisco | ios | 15.2\(2\)e3 | |
cisco | ios | 15.2\(2\)e4 | |
cisco | ios | 15.2\(2\)e5 | |
cisco | ios | 15.2\(2\)e5a | |
cisco | ios | 15.2\(2\)e5b | |
cisco | ios | 15.2\(2\)e6 | |
cisco | ios | 15.2\(2\)e7 | |
cisco | ios | 15.2\(2\)e7b | |
cisco | ios | 15.2\(2\)e8 | |
cisco | ios | 15.2\(2\)e9 | |
cisco | ios | 15.2\(2\)e9a | |
cisco | ios | 15.2\(2\)e10 | |
cisco | ios | 15.2\(2b\)e | |
cisco | ios | 15.2\(3\)e | |
cisco | ios | 15.2\(3\)e1 | |
cisco | ios | 15.2\(3\)e2 | |
cisco | ios | 15.2\(3\)e3 | |
cisco | ios | 15.2\(3\)e4 | |
cisco | ios | 15.2\(3\)e5 | |
cisco | ios | 15.2\(4\)e | |
cisco | ios | 15.2\(4\)e1 | |
cisco | ios | 15.2\(4\)e2 | |
cisco | ios | 15.2\(4\)e3 | |
cisco | ios | 15.2\(4\)e4 | |
cisco | ios | 15.2\(4\)e5 | |
cisco | ios | 15.2\(4\)e5a | |
cisco | ios | 15.2\(4\)e6 | |
cisco | ios | 15.2\(4\)e7 | |
cisco | ios | 15.2\(4\)e8 | |
cisco | ios | 15.3\(3\)jpj | |
cisco | ios_xe | 3.2.0sg | |
cisco | ios_xe | 3.2.1sg | |
cisco | ios_xe | 3.2.2sg | |
cisco | ios_xe | 3.2.3sg | |
cisco | ios_xe | 3.2.4sg | |
cisco | ios_xe | 3.2.5sg | |
cisco | ios_xe | 3.2.6sg | |
cisco | ios_xe | 3.2.7sg | |
cisco | ios_xe | 3.2.8sg | |
cisco | ios_xe | 3.2.9sg | |
cisco | ios_xe | 3.2.10sg | |
cisco | ios_xe | 3.2.11sg | |
cisco | ios_xe | 3.3.0sg | |
cisco | ios_xe | 3.3.0xo | |
cisco | ios_xe | 3.3.1sg | |
cisco | ios_xe | 3.3.1xo | |
cisco | ios_xe | 3.3.2sg | |
cisco | ios_xe | 3.3.2xo | |
cisco | ios_xe | 3.4.0sg | |
cisco | ios_xe | 3.4.1sg | |
cisco | ios_xe | 3.4.2sg | |
cisco | ios_xe | 3.4.3sg | |
cisco | ios_xe | 3.4.4sg | |
cisco | ios_xe | 3.4.5sg | |
cisco | ios_xe | 3.4.6sg | |
cisco | ios_xe | 3.4.7sg | |
cisco | ios_xe | 3.4.8sg | |
cisco | ios_xe | 3.5.0e | |
cisco | ios_xe | 3.5.1e | |
cisco | ios_xe | 3.5.2e | |
cisco | ios_xe | 3.5.3e | |
cisco | ios_xe | 3.6.0be | |
cisco | ios_xe | 3.6.0e | |
cisco | ios_xe | 3.6.1e | |
cisco | ios_xe | 3.6.3e | |
cisco | ios_xe | 3.6.4e | |
cisco | ios_xe | 3.6.5ae | |
cisco | ios_xe | 3.6.5be | |
cisco | ios_xe | 3.6.5e | |
cisco | ios_xe | 3.6.6e | |
cisco | ios_xe | 3.6.7e | |
cisco | ios_xe | 3.6.8e | |
cisco | ios_xe | 3.6.9e | |
cisco | ios_xe | 3.6.10e | |
cisco | ios_xe | 3.7.0e | |
cisco | ios_xe | 3.7.1e | |
cisco | ios_xe | 3.7.2e | |
cisco | ios_xe | 3.7.3e | |
cisco | ios_xe | 3.8.0e | |
cisco | ios_xe | 3.8.1e | |
cisco | ios_xe | 3.8.2e | |
cisco | ios_xe | 3.8.3e | |
cisco | ios_xe | 3.8.4e | |
cisco | ios_xe | 3.8.5ae | |
cisco | ios_xe | 3.8.5e | |
cisco | ios_xe | 3.8.6e | |
cisco | ios_xe | 3.8.7e | |
cisco | ios_xe | 3.8.8e | |
cisco | ios_xe | 3.9.0e | |
cisco | ios_xe | 3.9.1e | |
cisco | ios_xe | 3.9.2be | |
cisco | ios_xe | 3.9.2e | |
cisco | ios_xe | 3.10.0ce | |
cisco | ios_xe | 3.10.0e | |
cisco | ios_xe | 3.10.1ae | |
cisco | ios_xe | 3.10.1e | |
cisco | ios_xe | 3.10.1se | |
cisco | ios_xe | 3.10.2e | |
cisco | catalyst_4503-e | * | |
cisco | catalyst_4506-e | - | |
cisco | catalyst_4507r\+e | - | |
cisco | catalyst_4510r\+e | - | |
oracle | goldengate_management_pack | 12.2.1.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*", "matchCriteriaId": "AD397982-87E8-46CF-95A5-61435849D02A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*", "matchCriteriaId": "D5D896F9-9E25-464F-B6C5-55A2DD38CC44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*", "matchCriteriaId": "0FF566A3-331A-4A8A-9EEF-D1FBF71BF4C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*", "matchCriteriaId": "0623C531-CFF1-4C45-B8A7-BCF2C4678222", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*", "matchCriteriaId": "794B72BB-52D0-4307-8A61-73AA2477885A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*", "matchCriteriaId": "34E66D10-84F4-486D-BFAF-B7D4AE2E5583", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*", "matchCriteriaId": "C364500B-B7B0-47CC-9277-8D43BAB6E6D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B797B2-6AB2-4946-88C0-12D71258CCE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*", "matchCriteriaId": "F12B9DA7-28C4-4584-A548-6B06874F9C00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*", "matchCriteriaId": "AD0C66F2-D158-497D-8683-2264F58A33B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*", "matchCriteriaId": "5CE361F3-BA5B-453C-A58C-6E8CB84BC101", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*", "matchCriteriaId": "8C55E31F-B291-4FE9-81FB-A91E95323863", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*", "matchCriteriaId": "A081B105-AD3F-4529-B3E7-D8B0851C83B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*", "matchCriteriaId": "B3142DA6-0FA9-4CEC-95FC-938AFD944BAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*", "matchCriteriaId": "1644E8D2-E3F2-4ACB-A0D0-F374B565D121", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*", "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*", "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*", "matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*", "matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*", "matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*", "matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*", "matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*", "matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*", "matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*", "matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*", "matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*", "matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*", "matchCriteriaId": "9ED6E6E2-AB47-442C-93B9-DEBA9D124B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*", "matchCriteriaId": "F3CC7F08-343B-40CC-9D03-81EE4924D6C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*", "matchCriteriaId": "31444A2D-BBF0-4D6A-A898-5EC4E782CC43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*", "matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*", "matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*", "matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*", "matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*", "matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*", "matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*", "matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*", "matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*", "matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*", "matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*", "matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*", "matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*", "matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", "matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*", "matchCriteriaId": "F98E150B-C806-4CF6-83EC-0C16A44F3EFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "0687FD87-BAED-4776-9B94-3C9EA7CCE79A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*", "matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*", "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*", "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*", "matchCriteriaId": "2F69B4F2-4A03-4383-8958-11EE154A7350", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*", "matchCriteriaId": "86C0900A-1354-4A20-B5ED-8C005BCE4D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*", "matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*", "matchCriteriaId": "3104D911-5FFC-4605-B234-6FD40A206DC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*", "matchCriteriaId": "EC787C70-6540-4AF7-9F05-8FD86284091E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*", "matchCriteriaId": "FC716D3D-5C37-4E36-8F6B-53801DC7225E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*", "matchCriteriaId": "D5E289B7-7692-448B-B15E-224AF4F01D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*", "matchCriteriaId": "E42A8A6F-A732-4441-A94F-FCDFA960EB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*", "matchCriteriaId": "EE9EC5B2-CAE1-4C8F-8F96-FE006049FF96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*", "matchCriteriaId": "895D2447-BD8A-473C-B26E-06897080DD2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*", "matchCriteriaId": "F8169591-4C3D-4C32-A24F-EACDBC62B77F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*", "matchCriteriaId": "D5944EA5-29A2-438A-AA5E-ABC45E298419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*", "matchCriteriaId": "CD6584D8-AE44-40D0-990C-94C377DBF275", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*", "matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*", "matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*", "matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*", "matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*", "matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*", "matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*", "matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*", "matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*", "matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*", "matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*", "matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*", "matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*", "matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", "matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", "matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", "matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", "matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*", "matchCriteriaId": "DA2306E8-ABFD-4C37-A911-7B35A654147C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", "matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", "matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", "matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", "matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", "matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", "matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", "matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", "matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*", "matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*", "matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*", "matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*", "matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*", "matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*", "matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*", "matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", "matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*", "matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*", "matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*", "matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*", "matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*", "matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*", "matchCriteriaId": "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", "matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", "matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", "matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*", "matchCriteriaId": "A98F2654-46F3-4C63-A2C2-48B372C655B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*", "matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*", "matchCriteriaId": "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*", "matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_4503-e:*:*:*:*:*:*:*:*", "matchCriteriaId": "B082823E-5514-495A-8D9B-40F361D9EDE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4506-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B9B1430-D314-4AB7-81FD-4A50ED895450", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4507r\\+e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C9A0BDE-BA27-4AE8-8A29-4FAE720D80AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4510r\\+e:-:*:*:*:*:*:*:*", "matchCriteriaId": "56534C40-EE96-4D19-847A-73506025F75F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:goldengate_management_pack:12.2.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B56B61F-4E23-4764-9766-B334FD58EAD4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system." }, { "lang": "es", "value": "Una vulnerabilidad en el subsistema Simple Network Management Protocol (SNMP) de Cisco IOS Software y Cisco IOS XE Software en Catalyst 4500 Series Switches, podr\u00eda permitir a un atacante remoto autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente cuando el software procesa identificadores de objetos SNMP espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete SNMP dise\u00f1ado a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se vuela a cargar, resultando en una condici\u00f3n DoS. Nota: Para explotar esta vulnerabilidad usando SNMPv2c o anterior, el atacante debe conocer la cadena de comunidad de solo lectura SNMP para un sistema afectado. Para explotar esta vulnerabilidad usando SNMPv3, el atacante debe conocer las credenciales de usuario para el sistema afectado." } ], "id": "CVE-2020-3235", "lastModified": "2024-11-21T05:30:37.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-03T18:15:21.463", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5" }, { "source": "psirt@cisco.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-118" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.