Логотип exploitDog
bind:CVE-2020-3174
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3174

Количество 3

Количество 3

nvd логотип

CVE-2020-3174

почти 6 лет назад

A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-44pg-r8gr-j75x

больше 3 лет назад

A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.

EPSS: Низкий
fstec логотип

BDU:2020-01302

почти 6 лет назад

Уязвимость в функции шлюза anycast операционной системы Cisco NX-OS, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3174

A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.

CVSS3: 4.7
0%
Низкий
почти 6 лет назад
github логотип
GHSA-44pg-r8gr-j75x

A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01302

Уязвимость в функции шлюза anycast операционной системы Cisco NX-OS, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 4.7
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу