CVE-2020-3390
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in Simple Network Management Protocol (SNMP) trap generation for wireless clients of the Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause the device to unexpectedly reload, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to the lack of input validation of the information used to generate an SNMP trap in relation to a wireless client connection. An attacker could exploit this vulnerability by sending an 802.1x packet with crafted parameters during the wireless authentication setup phase of a connection. A successful exploit could allow the attacker to cause the device to reload, causing a DoS condition.
Una vulnerabilidad en la generación de trampas Simple Network Management Protocol (SNMP) para clientes inalámbricos del Cisco IOS XE Wireless Controller Software para la Cisco Catalyst 9000 Family, podría permitir a un atacante adyacente no autenticado causar que el dispositivo se recargue inesperadamente, provocando una denegación de servicio ( DoS) en un dispositivo afectado. La vulnerabilidad es debido a una falta de comprobación de entrada de la información usada para generar una trampa SNMP en relación con una conexión de cliente inalámbrico. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete 802.1x con parámetros diseñados durante la fase de configuración de autenticación inalámbrica de una conexión. Una explotación con éxito podría permitir al atacante causar que el dispositivo se recargue, provocando una condición de DoS.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2019-12-12 CVE Reserved
- 2020-09-24 CVE Published
- 2023-06-10 EPSS Updated
- 2024-11-13 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-40 Search vendor "Cisco" for product "Catalyst 9800-40" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-80 Search vendor "Cisco" for product "Catalyst 9800-80" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-cl Search vendor "Cisco" for product "Catalyst 9800-cl" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-l Search vendor "Cisco" for product "Catalyst 9800-l" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-l-c Search vendor "Cisco" for product "Catalyst 9800-l-c" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-l-f Search vendor "Cisco" for product "Catalyst 9800-l-f" | - | - |
Safe
|