CVE-2020-3175
Published Feb 26, 2020
Last updated 5 years ago
Overview
- Description
- A vulnerability in the resource handling system of Cisco NX-OS Software for Cisco MDS 9000 Series Multilayer Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource usage control. An attacker could exploit this vulnerability by sending traffic to the management interface (mgmt0) of an affected device at very high rates. An exploit could allow the attacker to cause unexpected behaviors such as high CPU usage, process crashes, or even full system reboots of an affected device.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD54E122-6102-451E-92BF-AF71D98AEBE0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "56426D35-FCFD-406E-9144-2E66C8C86EFC" }, { "criteria": "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D25FA4A8-408B-4E94-B7D9-7DC54B61322F" }, { "criteria": "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8" }, { "criteria": "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8A72BDC4-6640-45CC-A128-0CDEE38D3ADC" }, { "criteria": "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "90094569-AA2C-4D35-807F-9551FACE255F" }, { "criteria": "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "306AFBC9-A236-4D03-A1EB-CE7E838D8415" }, { "criteria": "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "12DB1A25-A7C9-412F-88BC-E89588896395" }, { "criteria": "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3925D2CF-9D7C-4498-8AF2-45E15D5D009F" }, { "criteria": "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C677D356-86C9-4491-A6CA-5E6306B2BB70" }, { "criteria": "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "28A3C579-7AAD-41A4-947F-CCB9B09402A5" }, { "criteria": "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5182CB50-4D32-4835-B1A8-817D989F919F" }, { "criteria": "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36B3B617-7554-4C36-9B41-19AA3BD2F6E9" }, { "criteria": "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B88879A9-A7F5-41E0-8A38-0E09E3FD27F4" } ], "operator": "OR" } ], "operator": "AND" } ]