ID CVE-2020-3422
Summary A vulnerability in the IP Service Level Agreement (SLA) responder feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the IP SLA responder to reuse an existing port, resulting in a denial of service (DoS) condition. The vulnerability exists because the IP SLA responder could consume a port that could be used by another feature. An attacker could exploit this vulnerability by sending specific IP SLA control packets to the IP SLA responder on an affected device. The control packets must include the port number that could be used by another configured feature. A successful exploit could allow the attacker to cause an in-use port to be consumed by the IP SLA responder, impacting the feature that was using the port and resulting in a DoS condition.
References
Vulnerable Configurations
  • cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*
    cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 22-05-2023 - 18:57)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
cisco 20200924 Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability
Last major update 22-05-2023 - 18:57
Published 24-09-2020 - 18:15
Last modified 22-05-2023 - 18:57
Back to Top