Vulnerability Description
A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of parameters in a Flexible NetFlow Version 9 record. An attacker could exploit this vulnerability by sending a malformed Flexible NetFlow Version 9 packet to the Control and Provisioning of Wireless Access Points (CAPWAP) data port of an affected device. An exploit could allow the attacker to trigger an infinite loop, resulting in a process crash that would cause a reload of the device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios Xe | 16.10.1 |
| Cisco | Catalyst 9800-40 | - |
| Cisco | Catalyst 9800-80 | - |
| Cisco | Catalyst 9800-Cl | - |
| Cisco | Catalyst 9800-L | - |
| Cisco | Catalyst 9800-L-C | - |
| Cisco | Catalyst 9800-L-F | - |
Related Weaknesses (CWE)
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iPatchVendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iPatchVendor Advisory
FAQ
What is CVE-2020-3221?
CVE-2020-3221 is a vulnerability with a CVSS score of 8.6 (HIGH). A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause...
How severe is CVE-2020-3221?
CVE-2020-3221 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-3221?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios Xe, Cisco Catalyst 9800-40, Cisco Catalyst 9800-80, Cisco Catalyst 9800-Cl, Cisco Catalyst 9800-L.