CVE-2020-3500Improper Restriction of Operations within the Bounds of a Memory Buffer in Cisco Staros

Severity
8.6HIGHNVD
CNA6.8
EPSS
0.3%
top 47.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17
Latest updateMay 24

Description

A vulnerability in the IPv6 implementation of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to an affected device with the goal of reaching the vulnerable section of the input buffer. A successful exploit could allow the attacker to cause the device to reload,

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-5vvg-4mgq-x55f: A vulnerability in the IPv6 implementation of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) conditio2022-05-24
CVEList
Cisco StarOS IPv6 Denial of Service Vulnerability2020-08-17

📋Vendor Advisories

1
Cisco
Cisco StarOS IPv6 Denial of Service Vulnerability2020-08-05
CVE-2020-3500 — Cisco Staros vulnerability | cvebase