CVE-2020-3493
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit these vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition on the affected device.
Múltiples vulnerabilidades en el procesamiento del protocolo de Control and Provisioning of Wireless Access Points (CAPWAP) de Cisco IOS XE Software para Cisco Catalyst 9800 Series Wireless Controllers, podrían permitir a un atacante adyacente no autenticado causar una condición de denegación de servicio (DoS) de un dispositivo afectado. Estas vulnerabilidades son debido a una comprobación insuficiente de los paquetes CAPWAP. Un atacante podría explotar estas vulnerabilidades mediante el envío de un paquete CAPWAP malformado hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar que el dispositivo afectado se bloquee y recargue, resultando en una condición de DoS en el dispositivo afectado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-12 CVE Reserved
- 2020-09-24 CVE Published
- 2023-06-10 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-40 Search vendor "Cisco" for product "Catalyst 9800-40" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-80 Search vendor "Cisco" for product "Catalyst 9800-80" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-cl Search vendor "Cisco" for product "Catalyst 9800-cl" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-l Search vendor "Cisco" for product "Catalyst 9800-l" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-l-c Search vendor "Cisco" for product "Catalyst 9800-l-c" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1 Search vendor "Cisco" for product "Ios Xe" and version "16.12.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Catalyst 9800-l-f Search vendor "Cisco" for product "Catalyst 9800-l-f" | - | - |
Safe
|