Vulnerability Description
A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | 12.2\(6\)i1 |
| Cisco | Ios Xe | 3.3.0se |
| Cisco | Nx-Os | 5.2\(1\)sv3\(3.1\) |
| Cisco | Nexus 1000V | - |
| Cisco | Nexus 7000 10-Slot | - |
| Cisco | Nexus 7000 18-Slot | - |
| Cisco | Nexus 7000 4-Slot | - |
| Cisco | Nexus 7000 9-Slot | - |
Related Weaknesses (CWE)
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sPatchVendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sPatchVendor Advisory
FAQ
What is CVE-2020-3228?
CVE-2020-3228 is a vulnerability with a CVSS score of 8.6 (HIGH). A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affect...
How severe is CVE-2020-3228?
CVE-2020-3228 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-3228?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco Ios Xe, Cisco Nx-Os, Cisco Nexus 1000V, Cisco Nexus 7000 10-Slot.