fkie_cve-2022-20697
Vulnerability from fkie_nvd
Published
2022-04-15 15:15
Modified
2024-11-21 06:43
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the web services interface of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper resource management in the HTTP server code. An attacker could exploit this vulnerability by sending a large number of HTTP requests to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 15.1\(3\)svr1 | |
| cisco | ios | 15.1\(3\)svr2 | |
| cisco | ios | 15.1\(3\)svr3 | |
| cisco | ios | 15.1\(3\)svs | |
| cisco | ios | 15.1\(3\)svs1 | |
| cisco | ios | 15.1\(3\)svt1 | |
| cisco | ios | 15.1\(3\)svt2 | |
| cisco | ios | 15.1\(3\)svt3 | |
| cisco | ios | 15.1\(3\)svu1 | |
| cisco | ios | 15.1\(3\)svu2 | |
| cisco | ios | 15.1\(3\)svu10 | |
| cisco | ios | 15.1\(3\)svv1 | |
| cisco | ios | 15.2\(7\)e3 | |
| cisco | ios | 15.2\(7\)e3a | |
| cisco | ios | 15.2\(7\)e3k | |
| cisco | ios | 15.2\(7\)e4 | |
| cisco | ios | 15.2\(8\)e | |
| cisco | ios | 15.2\(234k\)e | |
| cisco | ios | 15.3\(3\)jk100 | |
| cisco | ios | 15.3\(3\)jpj8 | |
| cisco | ios | 15.9\(3\)m2 | |
| cisco | ios | 15.9\(3\)m2a | |
| cisco | ios | 15.9\(3\)m3 | |
| cisco | ios | 15.9\(3\)m3a | |
| cisco | ios | 15.9\(3\)m3b | |
| cisco | ios | 15.9\(3\)m4 | |
| cisco | ios_xe | 3.11.3ae | |
| cisco | ios_xe | 3.11.3e | |
| cisco | ios_xe | 3.11.4e |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr1:*:*:*:*:*:*:*",
"matchCriteriaId": "806D2FF1-EADA-44C8-94BD-6BC18D138150",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr2:*:*:*:*:*:*:*",
"matchCriteriaId": "643D7544-34DA-46D9-831F-421ED00F3579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr3:*:*:*:*:*:*:*",
"matchCriteriaId": "F6354447-07DF-4913-82D9-BF249663499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC35AA-4BD3-4FBB-878D-3313D37D9AAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs1:*:*:*:*:*:*:*",
"matchCriteriaId": "5DAC36DC-F4C5-4C4C-9C27-20FD45AA4A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt1:*:*:*:*:*:*:*",
"matchCriteriaId": "66BD52DF-E396-415D-B46E-A8814579A01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt2:*:*:*:*:*:*:*",
"matchCriteriaId": "72A7CF9A-E1A7-4C1B-9015-5BC577805D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C17AB3-4EFC-478D-A447-43F444B4CDF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9711B4-23FF-4C41-86F5-94D5E941453B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu2:*:*:*:*:*:*:*",
"matchCriteriaId": "2710C44B-A353-4BCF-85E8-525AAF839A98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu10:*:*:*:*:*:*:*",
"matchCriteriaId": "CE460A37-D782-4DB2-9F18-44D16C45618A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svv1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A5EA4A-A127-4363-90F7-B21E9A086C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3a:*:*:*:*:*:*:*",
"matchCriteriaId": "6935EBC4-3881-46F4-B608-8E6C9EF8E37C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(234k\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "93681DCF-D5ED-4909-B41F-C7CB975DE282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk100:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF0C320-9055-4E71-808A-BF2B8E00B443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj8:*:*:*:*:*:*:*",
"matchCriteriaId": "17B04C67-F67A-4B7D-9826-D16DC88BD8A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
"matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web services interface of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper resource management in the HTTP server code. An attacker could exploit this vulnerability by sending a large number of HTTP requests to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz de servicios web de Cisco IOS Software and Cisco IOS XE Software podr\u00eda permitir a un atacante remoto autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad es debido a una administraci\u00f3n inapropiada de los recursos en el c\u00f3digo del servidor HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un gran n\u00famero de peticiones HTTP a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar a el dispositivo recargarse, resultando en una condici\u00f3n de DoS"
}
],
"id": "CVE-2022-20697",
"lastModified": "2024-11-21T06:43:21.053",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-15T15:15:12.967",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-dos-svOdkdBS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-dos-svOdkdBS"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-691"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…