Логотип exploitDog
bind:CVE-2020-3363
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3363

Количество 3

Количество 3

nvd логотип

CVE-2020-3363

больше 5 лет назад

A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-2hxc-5mh2-9rxg

больше 3 лет назад

A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.

EPSS: Низкий
fstec логотип

BDU:2020-04654

больше 5 лет назад

Уязвимость службы обработки трафика IPv6 микропрограммного обеспечения маршрутизаторов Cisco Small Business 250 Series, Cisco Small Business 350 Series, Cisco Small Business 350X Series, Cisco Small Business 550X Series, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3363

A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.

CVSS3: 8.6
1%
Низкий
больше 5 лет назад
github логотип
GHSA-2hxc-5mh2-9rxg

A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause an unexpected reboot of the switch, leading to a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04654

Уязвимость службы обработки трафика IPv6 микропрограммного обеспечения маршрутизаторов Cisco Small Business 250 Series, Cisco Small Business 350 Series, Cisco Small Business 350X Series, Cisco Small Business 550X Series, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу