目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2020-3486— Cisco Catalyst 9800 输入验证错误漏洞

EPSS 0.10% · P27
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2020-3486の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities
ソース: NVD (National Vulnerability Database)
脆弱性説明
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit these vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition on the affected device.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
输入验证不恰当
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Cisco Catalyst 9800 输入验证错误漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Cisco IOS和IOS XE都是美国思科(Cisco)公司的产品。Cisco IOS是一套为其网络设备开发的操作系统。 Cisco Catalyst 9800系列无线控制器的Cisco IOS XE软件的控制和供应无线接入点(CAPWAP)协议存在安全漏洞,该漏洞源于CAPWAP数据包验证不足所致。攻击者可利用该漏洞导致受影响的设备崩溃并重新加载,从而导致受影响的设备上出现DoS状况。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
CiscoCisco IOS XE Software n/a -

II. CVE-2020-3486の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2020-3486のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Cisco · 2020-09-24 · 52 CVEs total

CVE-2020-31418.8 HIGHCisco IOS XE Software Privilege Escalation Vulnerabilities
CVE-2020-34258.8 HIGHCisco IOS XE Software Privilege Escalation Vulnerabilities
CVE-2020-34808.6 HIGHCisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities
CVE-2020-33998.6 HIGHCisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Se
CVE-2020-34218.6 HIGHCisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities
CVE-2020-34267.5 HIGHCisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnera
CVE-2020-34657.4 HIGHCisco IOS XE Software Ethernet Frame Denial of Service Vulnerability
CVE-2020-35087.4 HIGHCisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP
CVE-2020-33966.8 MEDIUMCisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vu
CVE-2020-34176.8 MEDIUMCisco IOS XE Software Arbitrary Code Execution Vulnerability
CVE-2020-35136.7 MEDIUMCisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Exe
CVE-2020-34166.7 MEDIUMCisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Exe
CVE-2020-34796.1 MEDIUMCisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability
CVE-2020-35036.0 MEDIUMCisco IOS XE Software Guest Shell Unauthorized File System Access Vulnerability
CVE-2020-33936.0 MEDIUMCisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability
CVE-2020-34235.1 MEDIUMCisco IOS XE Software Arbitrary Code Execution Vulnerability
CVE-2020-34754.3 MEDIUMCisco IOS XE Software Web Management Framework Vulnerabilities
CVE-2020-34744.3 MEDIUMCisco IOS XE Software Web Management Framework Vulnerabilities
CVE-2020-3407Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vuln
CVE-2020-3409Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability

Showing 20 of 52 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2020-3486へのコメント

まだコメントはありません


コメントを残す