CVE-2023-20051
Published Apr 5, 2023
Last updated a year ago
Overview
- Description
- A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- ykramarz@cisco.com
- CWE-400
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:packet_data_network_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "552C22E2-0330-4A5B-B2C3-861A7BBE3CCD", "versionEndExcluding": "21.28.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "746254AC-B039-432C-AA5C-A82260E57AD7" }, { "criteria": "cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "301681DF-2A9E-4A91-9918-4A46153ADC01" }, { "criteria": "cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A9EF0299-16A7-446D-855D-BFF91EE65534" } ], "operator": "OR" } ], "operator": "AND" } ]