CVE-2020-3235

HIGH

Cisco IOS Software - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.

Scores

CVSS v3 7.7
EPSS 0.0029
EPSS Percentile 52.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-20 CWE-118
Status published
Products (50)
cisco/ios 12.2\(52\)sg
cisco/ios 12.2\(53\)sg1
cisco/ios 12.2\(53\)sg2
cisco/ios 12.2\(53\)sg3
cisco/ios 12.2\(53\)sg4
cisco/ios 12.2\(53\)sg5
cisco/ios 12.2\(53\)sg6
cisco/ios 12.2\(53\)sg7
cisco/ios 12.2\(53\)sg8
cisco/ios 12.2\(53\)sg9
... and 40 more
Published Jun 03, 2020
Tracked Since Feb 18, 2026