CVE-2020-3198
03.06.2020, 18:15
Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | ios | 12.2\(60\)ez16 |
cisco | ios | 15.0\(2\)sg11a |
cisco | ios | 15.3\(3\)jaa1 |
cisco | ios | 15.3\(3\)jpj |
cisco | ios | 15.4\(1\)cg |
cisco | ios | 15.4\(2\)cg |
cisco | ios | 15.4\(3\)m |
cisco | ios | 15.4\(3\)m1 |
cisco | ios | 15.4\(3\)m2 |
cisco | ios | 15.4\(3\)m3 |
cisco | ios | 15.4\(3\)m4 |
cisco | ios | 15.4\(3\)m5 |
cisco | ios | 15.4\(3\)m6 |
cisco | ios | 15.4\(3\)m6a |
cisco | ios | 15.4\(3\)m7 |
cisco | ios | 15.4\(3\)m8 |
cisco | ios | 15.4\(3\)m9 |
cisco | ios | 15.4\(3\)m10 |
cisco | ios | 15.5\(1\)t |
cisco | ios | 15.5\(1\)t2 |
cisco | ios | 15.5\(1\)t3 |
cisco | ios | 15.5\(1\)t4 |
cisco | ios | 15.5\(2\)t |
cisco | ios | 15.5\(2\)t1 |
cisco | ios | 15.5\(2\)t2 |
cisco | ios | 15.5\(2\)t3 |
cisco | ios | 15.5\(2\)t4 |
cisco | ios | 15.5\(3\)m |
cisco | ios | 15.5\(3\)m0a |
cisco | ios | 15.5\(3\)m1 |
cisco | ios | 15.5\(3\)m2 |
cisco | ios | 15.5\(3\)m2a |
cisco | ios | 15.5\(3\)m3 |
cisco | ios | 15.5\(3\)m4 |
cisco | ios | 15.5\(3\)m4a |
cisco | ios | 15.5\(3\)m5 |
cisco | ios | 15.5\(3\)m6 |
cisco | ios | 15.5\(3\)m6a |
cisco | ios | 15.5\(3\)m7 |
cisco | ios | 15.5\(3\)m8 |
cisco | ios | 15.5\(3\)m9 |
cisco | ios | 15.5\(3\)m10 |
cisco | ios | 15.5\(3\)m11 |
cisco | ios | 15.6\(1\)t |
cisco | ios | 15.6\(1\)t0a |
cisco | ios | 15.6\(1\)t1 |
cisco | ios | 15.6\(1\)t2 |
cisco | ios | 15.6\(1\)t3 |
cisco | ios | 15.6\(2\)t |
cisco | ios | 15.6\(2\)t1 |
cisco | ios | 15.6\(2\)t2 |
cisco | ios | 15.6\(2\)t3 |
cisco | ios | 15.6\(3\)m |
cisco | ios | 15.6\(3\)m0a |
cisco | ios | 15.6\(3\)m1 |
cisco | ios | 15.6\(3\)m1b |
cisco | ios | 15.6\(3\)m2 |
cisco | ios | 15.6\(3\)m3 |
cisco | ios | 15.6\(3\)m3a |
cisco | ios | 15.6\(3\)m4 |
cisco | ios | 15.6\(3\)m5 |
cisco | ios | 15.6\(3\)m6 |
cisco | ios | 15.6\(3\)m6a |
cisco | ios | 15.6\(3\)m6b |
cisco | ios | 15.6\(3\)m7 |
cisco | ios | 15.7\(3\)m |
cisco | ios | 15.7\(3\)m1 |
cisco | ios | 15.7\(3\)m2 |
cisco | ios | 15.7\(3\)m3 |
cisco | ios | 15.7\(3\)m4 |
cisco | ios | 15.7\(3\)m4a |
cisco | ios | 15.7\(3\)m4b |
cisco | ios | 15.7\(3\)m5 |
cisco | ios | 15.8\(3\)m |
cisco | ios | 15.8\(3\)m0a |
cisco | ios | 15.8\(3\)m1 |
cisco | ios | 15.8\(3\)m2 |
cisco | ios | 15.8\(3\)m2a |
cisco | ios | 15.8\(3\)m3 |
cisco | ios | 15.8\(3\)m3a |
cisco | ios | 15.8\(3\)m3b |
cisco | ios | 15.9\(3\)m |
cisco | ios | 15.9\(3\)m0a |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.