Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-0282

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-10 Jan, 2019 | 00:00
Updated At-21 Nov, 2024 | 19:49
Rejected At-
Credits

Cisco IOS and IOS XE Software TCP Denial of Service Vulnerability

A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:10 Jan, 2019 | 00:00
Updated At:21 Nov, 2024 | 19:49
Rejected At:
▼CVE Numbering Authority (CNA)
Cisco IOS and IOS XE Software TCP Denial of Service Vulnerability

A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco IOS
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
CWECWE-371CWE-371
Type: CWE
CWE ID: CWE-371
Description: CWE-371
Metrics
VersionBase scoreBase severityVector
3.06.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/106510
vdb-entry
x_refsource_BID
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.securityfocus.com/bid/106510
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp
Resource:
vendor-advisory
x_refsource_CISCO
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/106510
vdb-entry
x_refsource_BID
x_transferred
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.securityfocus.com/bid/106510
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:10 Jan, 2019 | 00:29
Updated At:28 Aug, 2020 | 18:14

A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Secondary3.06.8MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Primary2.07.1HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Type: Secondary
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 7.1
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24lc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24lc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24pc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24pc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48pst-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48pst-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-12pc-l>>-
cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-8pc-l>>-
cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-8tc-s>>-
cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cg-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cpd-8pt-l>>-
cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cpd-8tt-l>>-
cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-24pd-l>>-
cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-24ps-l>>-
cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-24td-l>>-
cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-24ts-l>>-
cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48fpd-l>>-
cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48fps-l>>-
cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48lpd-l>>-
cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48lps-l>>-
cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48td-l>>-
cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48ts-l>>-
cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-48ts-s>>-
cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f24ps-l>>-
cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f24ts-l>>-
cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f24ts-s>>-
cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f48fps-l>>-
cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f48lps-l>>-
cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f48ts-l>>-
cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960s-f48ts-s>>-
cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-24pd-l>>-
cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-24ps-l>>*
cpe:2.3:h:cisco:catalyst_2960x-24ps-l:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-24psq-l>>-
cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-24td-l>>-
cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-24ts-l>>-
cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-24ts-ll>>-
cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48fpd-l>>-
cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48fps-l>>-
cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48lpd-l>>-
cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48lps-l>>-
cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48td-l>>-
cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48ts-l>>-
cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960x-48ts-ll>>-
cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960xr-24pd-i>>-
cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960xr-24ps-i>>-
cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-371Secondaryykramarz@cisco.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-371
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/106510ykramarz@cisco.com
Third Party Advisory
VDB Entry
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcpykramarz@cisco.com
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/106510
Source: ykramarz@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp
Source: ykramarz@cisco.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

206Records found

CVE-2020-3303
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.46% / 63.11%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 16:42
Updated-15 Nov, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv1 Denial of Service Vulnerability

A vulnerability in the Internet Key Exchange version 1 (IKEv1) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper management of system memory. An attacker could exploit this vulnerability by sending malicious IKEv1 traffic to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa_5550adaptive_security_applianceasa_5505adaptive_security_appliance_softwareasa_5555-xasa_5520asa_5510asa_5525-xasa_5580asa_5585-xasa_5512-xfirepower_threat_defenseasa_5515-xCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-399
Not Available
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-3422
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-1.23% / 78.33%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:01
Updated-13 Nov, 2024 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability

A vulnerability in the IP Service Level Agreement (SLA) responder feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the IP SLA responder to reuse an existing port, resulting in a denial of service (DoS) condition. The vulnerability exists because the IP SLA responder could consume a port that could be used by another feature. An attacker could exploit this vulnerability by sending specific IP SLA control packets to the IP SLA responder on an affected device. The control packets must include the port number that could be used by another configured feature. A successful exploit could allow the attacker to cause an in-use port to be consumed by the IP SLA responder, impacting the feature that was using the port and resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-1111x_integrated_services_routercatalyst_3850catalyst_3650asr_1013catalyst_9200catalyst_98004431_integrated_services_router1160_integrated_services_routercatalyst_9600catalyst_9500asr_1002-hxcsr_1000v1100_integrated_services_routerios_xe4221_integrated_services_router4331_integrated_services_routerasr_10064461_integrated_services_routercatalyst_9300asr_1001-xasr_10041109_integrated_services_router1101_integrated_services_routercatalyst_9400asr_1001-hx111x_integrated_services_routerasr_1002-x1120_integrated_services_routerasr_1009-xasr_1006-xCisco IOS XE Software
CWE ID-CWE-371
Not Available
CVE-2020-3200
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.7||HIGH
EPSS-1.26% / 78.59%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:45
Updated-15 Nov, 2024 | 17:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software Secure Shell Denial of Service Vulnerability

A vulnerability in the Secure Shell (SSH) server code of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. The vulnerability is due to an internal state not being represented correctly in the SSH state machine, which leads to an unexpected behavior. An attacker could exploit this vulnerability by creating an SSH connection to an affected device and using a specific traffic pattern that causes an error condition within that connection. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS 12.2(58)SE
CWE ID-CWE-371
Not Available
CWE ID-CWE-436
Interpretation Conflict
CVE-2020-3574
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.50%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 18:16
Updated-13 Nov, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability

A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_room_phoneip_phone_8841_firmwareip_dect_6825_firmwareip_phone_8841ip_dect_210ip_phone_8861unified_ip_conference_phone_8831_firmwareip_phone_8811ip_dect_6825ip_phone_8811_firmwareip_phone_8851ip_dect_210_firmwareip_phone_8861_firmwarewebex_room_phone_firmwareunified_ip_conference_phone_8831ip_phone_8851_firmwareCisco IP Phones with Multiplatform Firmware
CWE ID-CWE-371
Not Available
CVE-2024-20455
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.6||HIGH
EPSS-0.48% / 64.14%
||
7 Day CHG+0.12%
Published-25 Sep, 2024 | 16:18
Updated-24 Oct, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeios_xe_sd-wanCisco IOS XE SoftwareCisco IOS XE Catalyst SD-WANios_xeios_xe_catalyst_sd-wan
CWE ID-CWE-371
Not Available
CVE-2020-3385
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.05% / 15.93%
||
7 Day CHG~0.00%
Published-16 Jul, 2020 | 17:22
Updated-15 Nov, 2024 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vEdge Routers Denial of Service Vulnerability

A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted packets through an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-vedge_cloud_routersd-wan_firmwarevedge_5000Cisco SD-WAN vEdge router
CWE ID-CWE-371
Not Available
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found