A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. The vulnerability is due to insufficient verification of authenticity of received Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by tampering with ESP cleartext values as a man-in-the-middle.
                
            References
                    | Link | Resource | 
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z | Patch Vendor Advisory | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 05:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z - Patch, Vendor Advisory | 
Information
                Published : 2020-06-03 18:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3220
Mitre link : CVE-2020-3220
CVE.ORG link : CVE-2020-3220
JSON object : View
Products Affected
                cisco
- ios_xe
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
