Логотип exploitDog
bind:CVE-2023-20051
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20051

Количество 3

Количество 3

nvd логотип

CVE-2023-20051

почти 3 года назад

A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-7prw-fc99-vjm9

почти 3 года назад

A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-01960

почти 3 года назад

Уязвимость платформы векторной обработки пакетов Vector Packet Processor (VPP) микропрограммного обеспечения шлюза сети пакетной передачи данных Cisco Packet Data Network Gateway (PGW), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20051

A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).

CVSS3: 5.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-7prw-fc99-vjm9

A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).

CVSS3: 7.5
1%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01960

Уязвимость платформы векторной обработки пакетов Vector Packet Processor (VPP) микропрограммного обеспечения шлюза сети пакетной передачи данных Cisco Packet Data Network Gateway (PGW), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.8
1%
Низкий
почти 3 года назад

Уязвимостей на страницу