CVE-2022-20697
Published Apr 15, 2022
Last updated a year ago
Overview
- Description
- A vulnerability in the web services interface of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper resource management in the HTTP server code. An attacker could exploit this vulnerability by sending a large number of HTTP requests to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "806D2FF1-EADA-44C8-94BD-6BC18D138150" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "643D7544-34DA-46D9-831F-421ED00F3579" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6354447-07DF-4913-82D9-BF249663499F" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46EC35AA-4BD3-4FBB-878D-3313D37D9AAB" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DAC36DC-F4C5-4C4C-9C27-20FD45AA4A85" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66BD52DF-E396-415D-B46E-A8814579A01F" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72A7CF9A-E1A7-4C1B-9015-5BC577805D9C" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C17AB3-4EFC-478D-A447-43F444B4CDF6" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C9711B4-23FF-4C41-86F5-94D5E941453B" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2710C44B-A353-4BCF-85E8-525AAF839A98" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE460A37-D782-4DB2-9F18-44D16C45618A" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svv1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2A5EA4A-A127-4363-90F7-B21E9A086C0D" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6935EBC4-3881-46F4-B608-8E6C9EF8E37C" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(234k\\)e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93681DCF-D5ED-4909-B41F-C7CB975DE282" }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk100:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BF0C320-9055-4E71-808A-BF2B8E00B443" }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17B04C67-F67A-4B7D-9826-D16DC88BD8A1" }, { "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8" }, { "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4" }, { "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB" }, { "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD" }, { "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5" }, { "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519" } ], "operator": "OR" } ] } ]