Логотип exploitDog
bind:CVE-2022-20919
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20919

Количество 3

Количество 3

nvd логотип

CVE-2022-20919

больше 3 лет назад

A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-3mfm-pfv2-vmrp

больше 3 лет назад

A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-00900

больше 3 лет назад

Уязвимость реализации протокола Common Industrial Protocol (CIP) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20919

A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.

CVSS3: 8.6
1%
Низкий
больше 3 лет назад
github логотип
GHSA-3mfm-pfv2-vmrp

A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2023-00900

Уязвимость реализации протокола Common Industrial Protocol (CIP) операционных систем Cisco IOS и Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу