Vulnerabilites related to cisco - catalyst_c9600_switch
Vulnerability from fkie_nvd
Published
2020-09-24 18:15
Modified
2024-11-21 05:31
Severity ?
Summary
A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*", matchCriteriaId: "B7D95E8A-8F0B-44E5-B266-09E10BAAEC55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "18736C74-F68F-4D0B-AE2B-4BC1834EF794", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "D223C2AB-22A4-42B5-8BBB-78E2CBF23B40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "BDD3EAA2-8F25-4099-B76F-5ACC3BE34610", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "AE9BD57F-BDAC-46DD-AF87-8914B29670F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "AFCEBFFC-DD60-4CB1-A7F2-9AC09977BA4F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F7B21F-1DAA-45C7-8C24-D3A19F1C5459", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*", matchCriteriaId: "1C4F9918-E075-4F78-AFD7-0BB7FA97C1F6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "C7E00A0B-A58E-472F-B107-0FE106751F2D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "BCB45406-5216-4A11-B8D3-C44639DC26B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "215D01AE-3767-482A-85C5-3361506F0AC3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "A06E37A8-166F-4534-9089-D20B1227F4DD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "F257D2BE-7618-4B6A-AFCE-6D9D0084FA1D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA927CE-9D8E-4BC0-9EA6-641E7C4F71B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "9A46D298-1685-410E-879C-2EBC45C185AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "CA4ACF54-E576-4D8A-A4E6-17A37EEC53DA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*", matchCriteriaId: "196A7C06-8371-479D-973D-591DEB181739", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "EE42511E-9883-4779-A8E5-FC3E16EF2793", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*", matchCriteriaId: "DB06AD21-91A7-46B8-8F44-683828A5422D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "5DA169AF-3743-4051-B63B-FF6E1ADCD886", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "7D13CF5B-4482-4C7D-8D6A-E220F3E4F868", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*", matchCriteriaId: "92134C0A-4E5B-43EF-8439-484DF504C43C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*", matchCriteriaId: "26ECF9BD-F632-4A02-8993-C0D44B91289C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "48730DB5-94AF-4BE7-8047-52B8B47CE35A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "E3A88142-3284-4C25-8774-36004B5F9087", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "8EB76311-4B6D-4897-A683-4244E92BD570", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDA2975-CDB7-4182-A03E-D34F15CDF6F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "35B9D0B5-4BE1-490E-9A68-00A3D357BC3D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "71FA2F5A-6146-4142-96A8-552118E4BB67", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "BEF786D6-F28F-49D8-A15C-BFD0AA934355", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32B0AC-1B0A-4ED8-8532-9C7BE6E059D4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*", matchCriteriaId: "1FEFF895-6E4A-4108-BD25-D7DC83154832", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "A485A9A0-2EEC-4C13-846C-0DE2265B2A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "3B9F1ACA-9D67-4BF0-A357-40D39A61ED00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*", matchCriteriaId: "6BFEE45F-C5AC-483D-9DE6-4CEB98D80A0C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6F5BBC-4627-4A3E-B827-3CEE7EE969D0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*", matchCriteriaId: "8B2E41E2-00CE-42C4-8C91-9307D76F5D7A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "98CB2D23-B5F8-4FA9-8431-3B0124CE2140", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*", matchCriteriaId: "E8A8BA9F-3361-43CD-8031-A5DF0AD68BEB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*", matchCriteriaId: "6DFE4BB6-FC9A-42B3-B8A0-2610D71BB9B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*", matchCriteriaId: "53D13F1D-345D-45D5-9000-DAFE8A85D71B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "8CFB064E-E390-47B5-AA76-5D3D2E368055", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9600_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D0C4E3-DE31-4426-89ED-D0B371C9610B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad WLAN Local Profiling de Cisco IOS XE Wireless Controller Software para Cisco Catalyst 9000 Family, podría permitir a un atacante adyacente no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido a un análisis incorrecto de paquetes HTTP mientras se llevan a cabo clasificaciones de dispositivos endpoint basadas en HTTP. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete HTTP diseñado hacia un dispositivo afectado. Una explotación con éxito podría hacer que un dispositivo afectado se reinicie, resultando una condición DoS.", }, ], id: "CVE-2020-3428", lastModified: "2024-11-21T05:31:03.023", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 4, source: "ykramarz@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-24T18:15:19.387", references: [ { source: "ykramarz@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3", }, ], sourceIdentifier: "ykramarz@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "ykramarz@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2020-3428
Vulnerability from cvelistv5
Published
2020-09-24 17:55
Modified
2024-11-13 17:57
Severity ?
EPSS score ?
Summary
A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco IOS XE Software |
Version: n/a |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:53.973Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200924 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3428", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:23:12.041103Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:57:01.984Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-09-24T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-24T17:55:54", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200924 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3", }, ], source: { advisory: "cisco-sa-dclass-dos-VKh9D8k3", defect: [ [ "CSCvr96076", ], ], discovery: "INTERNAL", }, title: "Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-09-24T16:00:00", ID: "CVE-2020-3428", STATE: "PUBLIC", TITLE: "Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.4", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200924 Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3", }, ], }, source: { advisory: "cisco-sa-dclass-dos-VKh9D8k3", defect: [ [ "CSCvr96076", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3428", datePublished: "2020-09-24T17:55:54.861257Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:57:01.984Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }