HIGH · 8.6

CVE-2020-3228

A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affect...

Vulnerability Description

A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

CVSS Score

8.6

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
CiscoIos12.2\(6\)i1
CiscoIos Xe3.3.0se
CiscoNx-Os5.2\(1\)sv3\(3.1\)
CiscoNexus 1000V-
CiscoNexus 7000 10-Slot-
CiscoNexus 7000 18-Slot-
CiscoNexus 7000 4-Slot-
CiscoNexus 7000 9-Slot-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-3228?

CVE-2020-3228 is a vulnerability with a CVSS score of 8.6 (HIGH). A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affect...

How severe is CVE-2020-3228?

CVE-2020-3228 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-3228?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco Ios Xe, Cisco Nx-Os, Cisco Nexus 1000V, Cisco Nexus 7000 10-Slot.