CVE-2020-3428

CVSS V2 Medium 6.1 CVSS V3 Medium 6.5
Description
A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
Overview
  • CVE ID
  • CVE-2020-3428
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-09-24T18:15:19
  • Last Modified Date
  • 2021-10-07T20:11:13
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:catalyst_c9600_switch:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:A/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • ADJACENT_NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 6.1
  • Severity
  • MEDIUM
  • Exploitability Score
  • 6.5
  • Impact Score
  • 6.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • ADJACENT_NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 6.5
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.8
  • Impact Score
  • 3.6
History
Created Old Value New Value Data Type Notes
2022-05-10 06:52:05 Added to TrackCVE
2022-12-04 23:17:52 psirt@cisco.com ykramarz@cisco.com CVE Assigner updated
2022-12-04 23:17:52 2020-09-24T18:15Z 2020-09-24T18:15:19 CVE Published Date updated
2022-12-04 23:17:52 2021-10-07T20:11:13 CVE Modified Date updated
2022-12-04 23:17:52 Analyzed Vulnerability Status updated