CVE-2020-3235

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.
Range Error
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
ciscoCNA
7.7 HIGH
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
VendorProductVersion
ciscoios
12.2\(52\)sg
ciscoios
12.2\(53\)sg1
ciscoios
12.2\(53\)sg2
ciscoios
12.2\(53\)sg3
ciscoios
12.2\(53\)sg4
ciscoios
12.2\(53\)sg5
ciscoios
12.2\(53\)sg6
ciscoios
12.2\(53\)sg7
ciscoios
12.2\(53\)sg8
ciscoios
12.2\(53\)sg9
ciscoios
12.2\(53\)sg10
ciscoios
12.2\(53\)sg11
ciscoios
12.2\(54\)sg
ciscoios
12.2\(54\)sg1
ciscoios
12.2\(54\)wo
ciscoios
15.0\(1\)ey
ciscoios
15.0\(1\)ey2
ciscoios
15.0\(1\)xo
ciscoios
15.0\(1\)xo1
ciscoios
15.0\(2\)ex2
ciscoios
15.0\(2\)ex8
ciscoios
15.0\(2\)sg
ciscoios
15.0\(2\)sg1
ciscoios
15.0\(2\)sg2
ciscoios
15.0\(2\)sg3
ciscoios
15.0\(2\)sg4
ciscoios
15.0\(2\)sg5
ciscoios
15.0\(2\)sg6
ciscoios
15.0\(2\)sg7
ciscoios
15.0\(2\)sg8
ciscoios
15.0\(2\)sg9
ciscoios
15.0\(2\)sg10
ciscoios
15.0\(2\)sg11
ciscoios
15.0\(2\)xo
ciscoios
15.1\(1\)sg
ciscoios
15.1\(1\)sg1
ciscoios
15.1\(1\)sg2
ciscoios
15.1\(2\)sg
ciscoios
15.1\(2\)sg1
ciscoios
15.1\(2\)sg2
ciscoios
15.1\(2\)sg3
ciscoios
15.1\(2\)sg4
ciscoios
15.1\(2\)sg5
ciscoios
15.1\(2\)sg6
ciscoios
15.1\(2\)sg7
ciscoios
15.1\(2\)sg8
ciscoios
15.2\(1\)e
ciscoios
15.2\(1\)e1
ciscoios
15.2\(1\)e3
ciscoios
15.2\(2\)e
ciscoios
15.2\(2\)e1
ciscoios
15.2\(2\)e2
ciscoios
15.2\(2\)e3
ciscoios
15.2\(2\)e4
ciscoios
15.2\(2\)e5
ciscoios
15.2\(2\)e5a
ciscoios
15.2\(2\)e5b
ciscoios
15.2\(2\)e6
ciscoios
15.2\(2\)e7
ciscoios
15.2\(2\)e7b
ciscoios
15.2\(2\)e8
ciscoios
15.2\(2\)e9
ciscoios
15.2\(2\)e9a
ciscoios
15.2\(2\)e10
ciscoios
15.2\(2b\)e
ciscoios
15.2\(3\)e
ciscoios
15.2\(3\)e1
ciscoios
15.2\(3\)e2
ciscoios
15.2\(3\)e3
ciscoios
15.2\(3\)e4
ciscoios
15.2\(3\)e5
ciscoios
15.2\(4\)e
ciscoios
15.2\(4\)e1
ciscoios
15.2\(4\)e2
ciscoios
15.2\(4\)e3
ciscoios
15.2\(4\)e4
ciscoios
15.2\(4\)e5
ciscoios
15.2\(4\)e5a
ciscoios
15.2\(4\)e6
ciscoios
15.2\(4\)e7
ciscoios
15.2\(4\)e8
ciscoios
15.3\(3\)jpj
ciscoios_xe
3.2.0sg:sg
ciscoios_xe
3.2.1sg:sg
ciscoios_xe
3.2.2sg:sg
ciscoios_xe
3.2.3sg:sg
ciscoios_xe
3.2.4sg:sg
ciscoios_xe
3.2.5sg:sg
ciscoios_xe
3.2.6sg:sg
ciscoios_xe
3.2.7sg:sg
ciscoios_xe
3.2.8sg:sg
ciscoios_xe
3.2.9sg:sg
ciscoios_xe
3.2.10sg:sg
ciscoios_xe
3.2.11sg:sg
ciscoios_xe
3.3.0sg:sg
ciscoios_xe
3.3.0xo:xo
ciscoios_xe
3.3.1sg:sg
ciscoios_xe
3.3.1xo:xo
ciscoios_xe
3.3.2sg:sg
ciscoios_xe
3.3.2xo:xo
ciscoios_xe
3.4.0sg:sg
ciscoios_xe
3.4.1sg:sg
ciscoios_xe
3.4.2sg:sg
ciscoios_xe
3.4.3sg:sg
ciscoios_xe
3.4.4sg:sg
ciscoios_xe
3.4.5sg:sg
ciscoios_xe
3.4.6sg:sg
ciscoios_xe
3.4.7sg:sg
ciscoios_xe
3.4.8sg:sg
ciscoios_xe
3.5.0e:e
ciscoios_xe
3.5.1e:e
ciscoios_xe
3.5.2e:e
ciscoios_xe
3.5.3e:e
ciscoios_xe
3.6.0be:be
ciscoios_xe
3.6.0e:e
ciscoios_xe
3.6.1e:e
ciscoios_xe
3.6.3e:e
ciscoios_xe
3.6.4e:e
ciscoios_xe
3.6.5ae:ae
ciscoios_xe
3.6.5be:be
ciscoios_xe
3.6.5e:e
ciscoios_xe
3.6.6e:e
ciscoios_xe
3.6.7e:e
ciscoios_xe
3.6.8e:e
ciscoios_xe
3.6.9e:e
ciscoios_xe
3.6.10e:e
ciscoios_xe
3.7.0e:e
ciscoios_xe
3.7.1e:e
ciscoios_xe
3.7.2e:e
ciscoios_xe
3.7.3e:e
ciscoios_xe
3.8.0e:e
ciscoios_xe
3.8.1e:e
ciscoios_xe
3.8.2e:e
ciscoios_xe
3.8.3e:e
ciscoios_xe
3.8.4e:e
ciscoios_xe
3.8.5ae:ae
ciscoios_xe
3.8.5e:e
ciscoios_xe
3.8.6e:e
ciscoios_xe
3.8.7e:e
ciscoios_xe
3.8.8e:e
ciscoios_xe
3.9.0e:e
ciscoios_xe
3.9.1e:e
ciscoios_xe
3.9.2be:be
ciscoios_xe
3.9.2e:e
ciscoios_xe
3.10.0ce:ce
ciscoios_xe
3.10.0e:e
ciscoios_xe
3.10.1ae:ae
ciscoios_xe
3.10.1e:e
ciscoios_xe
3.10.1se:se
ciscoios_xe
3.10.2e:e
oraclegoldengate_management_pack
12.2.1.2.0
𝑥
= Vulnerable software versions