Логотип exploitDog
bind:CVE-2020-3225
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3225

Количество 3

Количество 3

nvd логотип

CVE-2020-3225

больше 5 лет назад

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-h6c9-q6x7-9r7w

больше 3 лет назад

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2020-02889

больше 5 лет назад

Уязвимость реализации протокола Common Industrial Protocol (CIP) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3225

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

CVSS3: 8.6
1%
Низкий
больше 5 лет назад
github логотип
GHSA-h6c9-q6x7-9r7w

Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

CVSS3: 8.6
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02889

Уязвимость реализации протокола Common Industrial Protocol (CIP) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу