CVE-2020-3232

Published Jun 3, 2020

Last updated 3 years ago

Overview

Description
A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Source
ykramarz@cisco.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.7
Impact score
4
Exploitability score
3.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Severity
HIGH

CVSS 3.0

Type
Secondary
Base score
6.3
Impact score
4
Exploitability score
1.8
Vector string
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
6.8
Impact score
6.9
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:N/I:N/A:C

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
ykramarz@cisco.com
CWE-19

Social media

Hype score
Not currently trending

Configurations