CVE-2020-3221
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/06/2020
Last modified:
17/09/2021
Description
A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of parameters in a Flexible NetFlow Version 9 record. An attacker could exploit this vulnerability by sending a malformed Flexible NetFlow Version 9 packet to the Control and Provisioning of Wireless Access Points (CAPWAP) data port of an affected device. An exploit could allow the attacker to trigger an infinite loop, resulting in a process crash that would cause a reload of the device.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page