Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-20678

Опубликовано: 15 апр. 2022
Источник: nvd
CVSS3: 8.6
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*

Одно из

cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*

EPSS

Процентиль: 52%
0.0029
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-413
CWE-755

Связанные уязвимости

CVSS3: 7.5
github
почти 4 года назад

A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload.

CVSS3: 8.6
fstec
почти 4 года назад

Уязвимость функции AppNav-XE операционной системы Cisco IOS XE, позволяющая нарушителю вызвать перезагрузку устройства или вызвать отказ в обслуживании

EPSS

Процентиль: 52%
0.0029
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-413
CWE-755