// For flags

CVE-2020-3527

Cisco Catalyst 9200 Series Switches Jumbo Frame Denial of Service Vulnerability

Severity Score

8.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the Polaris kernel of Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to crash the device. The vulnerability is due to insufficient packet size validation. An attacker could exploit this vulnerability by sending jumbo frames or frames larger than the configured MTU size to the management interface of this device. A successful exploit could allow the attacker to crash the device fully before an automatic recovery.

Una vulnerabilidad en el kernel Polaris de Cisco Catalyst 9200 Series Switches, podría permitir a un atacante remoto no autenticado bloquear el dispositivo. La vulnerabilidad es debido a una comprobación insuficiente del tamaño del paquete. Un atacante podría explotar esta vulnerabilidad mediante el envío de tramas gigantes o tramas más grandes que el tamaño de MTU configurado hacia la interfaz de administración de este dispositivo. Una explotación con éxito podría permitir al atacante bloquear completamente el dispositivo antes de una recuperación automática.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-09-24 CVE Published
  • 2023-06-10 EPSS Updated
  • 2024-11-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24p-4g
Search vendor "Cisco" for product "Catalyst C9200l-24p-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24p-4x
Search vendor "Cisco" for product "Catalyst C9200l-24p-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24pxg-2y
Search vendor "Cisco" for product "Catalyst C9200l-24pxg-2y"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24pxg-4x
Search vendor "Cisco" for product "Catalyst C9200l-24pxg-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24t-4g
Search vendor "Cisco" for product "Catalyst C9200l-24t-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24t-4x
Search vendor "Cisco" for product "Catalyst C9200l-24t-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48p-4g
Search vendor "Cisco" for product "Catalyst C9200l-48p-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48p-4x
Search vendor "Cisco" for product "Catalyst C9200l-48p-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48pxg-2y
Search vendor "Cisco" for product "Catalyst C9200l-48pxg-2y"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48pxg-4x
Search vendor "Cisco" for product "Catalyst C9200l-48pxg-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48t-4g
Search vendor "Cisco" for product "Catalyst C9200l-48t-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.9.0 < 16.9.5
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.9.0 < 16.9.5"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48t-4x
Search vendor "Cisco" for product "Catalyst C9200l-48t-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24p-4g
Search vendor "Cisco" for product "Catalyst C9200l-24p-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24p-4x
Search vendor "Cisco" for product "Catalyst C9200l-24p-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24pxg-2y
Search vendor "Cisco" for product "Catalyst C9200l-24pxg-2y"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24pxg-4x
Search vendor "Cisco" for product "Catalyst C9200l-24pxg-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24t-4g
Search vendor "Cisco" for product "Catalyst C9200l-24t-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-24t-4x
Search vendor "Cisco" for product "Catalyst C9200l-24t-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48p-4g
Search vendor "Cisco" for product "Catalyst C9200l-48p-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48p-4x
Search vendor "Cisco" for product "Catalyst C9200l-48p-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48pxg-2y
Search vendor "Cisco" for product "Catalyst C9200l-48pxg-2y"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48pxg-4x
Search vendor "Cisco" for product "Catalyst C9200l-48pxg-4x"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48t-4g
Search vendor "Cisco" for product "Catalyst C9200l-48t-4g"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
>= 16.12.0 < 16.12.3
Search vendor "Cisco" for product "Ios Xe" and version " >= 16.12.0 < 16.12.3"
-
Affected
in Cisco
Search vendor "Cisco"
Catalyst C9200l-48t-4x
Search vendor "Cisco" for product "Catalyst C9200l-48t-4x"
--
Safe