fkie_cve-2020-3235
Vulnerability from fkie_nvd
Published
2020-06-03 18:15
Modified
2024-11-21 05:30
Severity ?
Summary
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.2\(52\)sg | |
| cisco | ios | 12.2\(53\)sg1 | |
| cisco | ios | 12.2\(53\)sg2 | |
| cisco | ios | 12.2\(53\)sg3 | |
| cisco | ios | 12.2\(53\)sg4 | |
| cisco | ios | 12.2\(53\)sg5 | |
| cisco | ios | 12.2\(53\)sg6 | |
| cisco | ios | 12.2\(53\)sg7 | |
| cisco | ios | 12.2\(53\)sg8 | |
| cisco | ios | 12.2\(53\)sg9 | |
| cisco | ios | 12.2\(53\)sg10 | |
| cisco | ios | 12.2\(53\)sg11 | |
| cisco | ios | 12.2\(54\)sg | |
| cisco | ios | 12.2\(54\)sg1 | |
| cisco | ios | 12.2\(54\)wo | |
| cisco | ios | 15.0\(1\)ey | |
| cisco | ios | 15.0\(1\)ey2 | |
| cisco | ios | 15.0\(1\)xo | |
| cisco | ios | 15.0\(1\)xo1 | |
| cisco | ios | 15.0\(2\)ex2 | |
| cisco | ios | 15.0\(2\)ex8 | |
| cisco | ios | 15.0\(2\)sg | |
| cisco | ios | 15.0\(2\)sg1 | |
| cisco | ios | 15.0\(2\)sg2 | |
| cisco | ios | 15.0\(2\)sg3 | |
| cisco | ios | 15.0\(2\)sg4 | |
| cisco | ios | 15.0\(2\)sg5 | |
| cisco | ios | 15.0\(2\)sg6 | |
| cisco | ios | 15.0\(2\)sg7 | |
| cisco | ios | 15.0\(2\)sg8 | |
| cisco | ios | 15.0\(2\)sg9 | |
| cisco | ios | 15.0\(2\)sg10 | |
| cisco | ios | 15.0\(2\)sg11 | |
| cisco | ios | 15.0\(2\)xo | |
| cisco | ios | 15.1\(1\)sg | |
| cisco | ios | 15.1\(1\)sg1 | |
| cisco | ios | 15.1\(1\)sg2 | |
| cisco | ios | 15.1\(2\)sg | |
| cisco | ios | 15.1\(2\)sg1 | |
| cisco | ios | 15.1\(2\)sg2 | |
| cisco | ios | 15.1\(2\)sg3 | |
| cisco | ios | 15.1\(2\)sg4 | |
| cisco | ios | 15.1\(2\)sg5 | |
| cisco | ios | 15.1\(2\)sg6 | |
| cisco | ios | 15.1\(2\)sg7 | |
| cisco | ios | 15.1\(2\)sg8 | |
| cisco | ios | 15.2\(1\)e | |
| cisco | ios | 15.2\(1\)e1 | |
| cisco | ios | 15.2\(1\)e3 | |
| cisco | ios | 15.2\(2\)e | |
| cisco | ios | 15.2\(2\)e1 | |
| cisco | ios | 15.2\(2\)e2 | |
| cisco | ios | 15.2\(2\)e3 | |
| cisco | ios | 15.2\(2\)e4 | |
| cisco | ios | 15.2\(2\)e5 | |
| cisco | ios | 15.2\(2\)e5a | |
| cisco | ios | 15.2\(2\)e5b | |
| cisco | ios | 15.2\(2\)e6 | |
| cisco | ios | 15.2\(2\)e7 | |
| cisco | ios | 15.2\(2\)e7b | |
| cisco | ios | 15.2\(2\)e8 | |
| cisco | ios | 15.2\(2\)e9 | |
| cisco | ios | 15.2\(2\)e9a | |
| cisco | ios | 15.2\(2\)e10 | |
| cisco | ios | 15.2\(2b\)e | |
| cisco | ios | 15.2\(3\)e | |
| cisco | ios | 15.2\(3\)e1 | |
| cisco | ios | 15.2\(3\)e2 | |
| cisco | ios | 15.2\(3\)e3 | |
| cisco | ios | 15.2\(3\)e4 | |
| cisco | ios | 15.2\(3\)e5 | |
| cisco | ios | 15.2\(4\)e | |
| cisco | ios | 15.2\(4\)e1 | |
| cisco | ios | 15.2\(4\)e2 | |
| cisco | ios | 15.2\(4\)e3 | |
| cisco | ios | 15.2\(4\)e4 | |
| cisco | ios | 15.2\(4\)e5 | |
| cisco | ios | 15.2\(4\)e5a | |
| cisco | ios | 15.2\(4\)e6 | |
| cisco | ios | 15.2\(4\)e7 | |
| cisco | ios | 15.2\(4\)e8 | |
| cisco | ios | 15.3\(3\)jpj | |
| cisco | ios_xe | 3.2.0sg | |
| cisco | ios_xe | 3.2.1sg | |
| cisco | ios_xe | 3.2.2sg | |
| cisco | ios_xe | 3.2.3sg | |
| cisco | ios_xe | 3.2.4sg | |
| cisco | ios_xe | 3.2.5sg | |
| cisco | ios_xe | 3.2.6sg | |
| cisco | ios_xe | 3.2.7sg | |
| cisco | ios_xe | 3.2.8sg | |
| cisco | ios_xe | 3.2.9sg | |
| cisco | ios_xe | 3.2.10sg | |
| cisco | ios_xe | 3.2.11sg | |
| cisco | ios_xe | 3.3.0sg | |
| cisco | ios_xe | 3.3.0xo | |
| cisco | ios_xe | 3.3.1sg | |
| cisco | ios_xe | 3.3.1xo | |
| cisco | ios_xe | 3.3.2sg | |
| cisco | ios_xe | 3.3.2xo | |
| cisco | ios_xe | 3.4.0sg | |
| cisco | ios_xe | 3.4.1sg | |
| cisco | ios_xe | 3.4.2sg | |
| cisco | ios_xe | 3.4.3sg | |
| cisco | ios_xe | 3.4.4sg | |
| cisco | ios_xe | 3.4.5sg | |
| cisco | ios_xe | 3.4.6sg | |
| cisco | ios_xe | 3.4.7sg | |
| cisco | ios_xe | 3.4.8sg | |
| cisco | ios_xe | 3.5.0e | |
| cisco | ios_xe | 3.5.1e | |
| cisco | ios_xe | 3.5.2e | |
| cisco | ios_xe | 3.5.3e | |
| cisco | ios_xe | 3.6.0be | |
| cisco | ios_xe | 3.6.0e | |
| cisco | ios_xe | 3.6.1e | |
| cisco | ios_xe | 3.6.3e | |
| cisco | ios_xe | 3.6.4e | |
| cisco | ios_xe | 3.6.5ae | |
| cisco | ios_xe | 3.6.5be | |
| cisco | ios_xe | 3.6.5e | |
| cisco | ios_xe | 3.6.6e | |
| cisco | ios_xe | 3.6.7e | |
| cisco | ios_xe | 3.6.8e | |
| cisco | ios_xe | 3.6.9e | |
| cisco | ios_xe | 3.6.10e | |
| cisco | ios_xe | 3.7.0e | |
| cisco | ios_xe | 3.7.1e | |
| cisco | ios_xe | 3.7.2e | |
| cisco | ios_xe | 3.7.3e | |
| cisco | ios_xe | 3.8.0e | |
| cisco | ios_xe | 3.8.1e | |
| cisco | ios_xe | 3.8.2e | |
| cisco | ios_xe | 3.8.3e | |
| cisco | ios_xe | 3.8.4e | |
| cisco | ios_xe | 3.8.5ae | |
| cisco | ios_xe | 3.8.5e | |
| cisco | ios_xe | 3.8.6e | |
| cisco | ios_xe | 3.8.7e | |
| cisco | ios_xe | 3.8.8e | |
| cisco | ios_xe | 3.9.0e | |
| cisco | ios_xe | 3.9.1e | |
| cisco | ios_xe | 3.9.2be | |
| cisco | ios_xe | 3.9.2e | |
| cisco | ios_xe | 3.10.0ce | |
| cisco | ios_xe | 3.10.0e | |
| cisco | ios_xe | 3.10.1ae | |
| cisco | ios_xe | 3.10.1e | |
| cisco | ios_xe | 3.10.1se | |
| cisco | ios_xe | 3.10.2e | |
| cisco | catalyst_4503-e | * | |
| cisco | catalyst_4506-e | - | |
| cisco | catalyst_4507r\+e | - | |
| cisco | catalyst_4510r\+e | - | |
| oracle | goldengate_management_pack | 12.2.1.2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "AD397982-87E8-46CF-95A5-61435849D02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D896F9-9E25-464F-B6C5-55A2DD38CC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF566A3-331A-4A8A-9EEF-D1FBF71BF4C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "0623C531-CFF1-4C45-B8A7-BCF2C4678222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "794B72BB-52D0-4307-8A61-73AA2477885A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "34E66D10-84F4-486D-BFAF-B7D4AE2E5583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "C364500B-B7B0-47CC-9277-8D43BAB6E6D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B797B2-6AB2-4946-88C0-12D71258CCE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "F12B9DA7-28C4-4584-A548-6B06874F9C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0C66F2-D158-497D-8683-2264F58A33B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE361F3-BA5B-453C-A58C-6E8CB84BC101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "8C55E31F-B291-4FE9-81FB-A91E95323863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A081B105-AD3F-4529-B3E7-D8B0851C83B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3142DA6-0FA9-4CEC-95FC-938AFD944BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"matchCriteriaId": "1644E8D2-E3F2-4ACB-A0D0-F374B565D121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED6E6E2-AB47-442C-93B9-DEBA9D124B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3CC7F08-343B-40CC-9D03-81EE4924D6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "31444A2D-BBF0-4D6A-A898-5EC4E782CC43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"matchCriteriaId": "F98E150B-C806-4CF6-83EC-0C16A44F3EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "0687FD87-BAED-4776-9B94-3C9EA7CCE79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*",
"matchCriteriaId": "2F69B4F2-4A03-4383-8958-11EE154A7350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "86C0900A-1354-4A20-B5ED-8C005BCE4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3104D911-5FFC-4605-B234-6FD40A206DC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EC787C70-6540-4AF7-9F05-8FD86284091E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FC716D3D-5C37-4E36-8F6B-53801DC7225E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E289B7-7692-448B-B15E-224AF4F01D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E42A8A6F-A732-4441-A94F-FCDFA960EB9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9EC5B2-CAE1-4C8F-8F96-FE006049FF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "895D2447-BD8A-473C-B26E-06897080DD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F8169591-4C3D-4C32-A24F-EACDBC62B77F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D5944EA5-29A2-438A-AA5E-ABC45E298419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6584D8-AE44-40D0-990C-94C377DBF275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2306E8-ABFD-4C37-A911-7B35A654147C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"matchCriteriaId": "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "A98F2654-46F3-4C63-A2C2-48B372C655B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_4503-e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B082823E-5514-495A-8D9B-40F361D9EDE5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4506-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B9B1430-D314-4AB7-81FD-4A50ED895450",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4507r\\+e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C9A0BDE-BA27-4AE8-8A29-4FAE720D80AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4510r\\+e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56534C40-EE96-4D19-847A-73506025F75F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:goldengate_management_pack:12.2.1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8B56B61F-4E23-4764-9766-B334FD58EAD4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el subsistema Simple Network Management Protocol (SNMP) de Cisco IOS Software y Cisco IOS XE Software en Catalyst 4500 Series Switches, podr\u00eda permitir a un atacante remoto autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a una comprobaci\u00f3n de entrada insuficiente cuando el software procesa identificadores de objetos SNMP espec\u00edficos. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete SNMP dise\u00f1ado a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se vuela a cargar, resultando en una condici\u00f3n DoS. Nota: Para explotar esta vulnerabilidad usando SNMPv2c o anterior, el atacante debe conocer la cadena de comunidad de solo lectura SNMP para un sistema afectado. Para explotar esta vulnerabilidad usando SNMPv3, el atacante debe conocer las credenciales de usuario para el sistema afectado."
}
],
"id": "CVE-2020-3235",
"lastModified": "2024-11-21T05:30:37.590",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-03T18:15:21.463",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-118"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…