Логотип exploitDog
bind:CVE-2020-3232
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3232

Количество 3

Количество 3

nvd логотип

CVE-2020-3232

больше 5 лет назад

A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-jg2q-fxw2-f6wc

больше 3 лет назад

A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

CVSS3: 7.7
EPSS: Низкий
fstec логотип

BDU:2020-03054

больше 5 лет назад

Уязвимость реализации протокола Simple Network Management Protocol (SNMP) микропрограммного обеспечения сетевых устройств Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3232

A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
github логотип
GHSA-jg2q-fxw2-f6wc

A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

CVSS3: 7.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-03054

Уязвимость реализации протокола Simple Network Management Protocol (SNMP) микропрограммного обеспечения сетевых устройств Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.3
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу