Логотип exploitDog
bind:CVE-2022-20870
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20870

Количество 3

Количество 3

nvd логотип

CVE-2022-20870

больше 3 лет назад

A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-prm7-p5hm-qq42

больше 3 лет назад

A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2023-00797

больше 3 лет назад

Уязвимость реализации функции обработки входящих пакетов MPLS операционной системы Cisco IOS XR микропрограммного обеспечения коммутаторов Cisco Catalyst 3650, Cisco Catalyst 3850 и Cisco Catalyst 9300, связанная с ошибками при обработке параметров длины входных данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20870

A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 8.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-prm7-p5hm-qq42

A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 8.6
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2023-00797

Уязвимость реализации функции обработки входящих пакетов MPLS операционной системы Cisco IOS XR микропрограммного обеспечения коммутаторов Cisco Catalyst 3650, Cisco Catalyst 3850 и Cisco Catalyst 9300, связанная с ошибками при обработке параметров длины входных данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу