Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to gain unauthorized read access to sensitive data or cause the web management software to hang or crash, resulting in a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 4.3 |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr - Vendor Advisory |
22 May 2023, 18:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco 1111x Integrated Services Router
Cisco 1109 Integrated Services Router Cisco 1160 Integrated Services Router Cisco 1100 Integrated Services Router Cisco 1120 Integrated Services Router Cisco 1101 Integrated Services Router Cisco 111x Integrated Services Router |
|
CPE | cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* |
Information
Published : 2020-09-24 18:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3475
Mitre link : CVE-2020-3475
CVE.ORG link : CVE-2020-3475
JSON object : View
Products Affected
cisco
- ws-c3850-24t
- ws-c3650-24ps
- catalyst_c9300l-24t-4g
- catalyst_c9500-40x
- 1101_integrated_services_router
- ws-c3650-48pq
- ws-c3850-48xs
- catalyst_c9200l-48p-4x
- asr_1006-x
- ws-c3650-12x48uq
- 1100_integrated_services_router
- ws-c3850-12xs
- asr_1004
- catalyst_c9500-32c
- catalyst_c9300-24t
- ws-c3650-48fq
- ws-c3650-48pd
- catalyst_c9500-12q
- catalyst_c9300-24u
- catalyst_c9300l-48p-4x
- catalyst_c9200l-48pxg-4x
- asr_1013
- catalyst_c9200l-24p-4x
- catalyst_c9200l-24p-4g
- catalyst_c9300l-24p-4g
- ws-c3850-12x48u
- catalyst_c9500-24y4c
- catalyst_c9300-48u
- catalyst_c9200l-48pxg-2y
- catalyst_c9300l-24p-4x
- ios
- catalyst_c9300-24ux
- catalyst_c9200l-24t-4x
- catalyst_c9200l-48t-4g
- ws-c3650-48fd
- ws-c3650-12x48ur
- ws-c3650-48td
- asr_1002-x
- ws-c3850-48f
- catalyst_9800-cl
- ws-c3850-48p
- catalyst_9800-80
- 1109_integrated_services_router
- catalyst_c9300-24p
- catalyst_c9300-48p
- catalyst_c9200l-24pxg-2y
- catalyst_c9500-32qc
- catalyst_c9300l-48p-4g
- 1111x_integrated_services_router
- catalyst_c9200-24p
- catalyst_c9300-48t
- ws-c3850-48u
- catalyst_c9300-48un
- ws-c3650-8x24uq
- catalyst_c9200l-24pxg-4x
- 1160_integrated_services_router
- catalyst_c9300l-48t-4x
- asr_1009-x
- catalyst_c9200l-48p-4g
- ws-c3850-24p
- catalyst_c9500-16x
- ws-c3850-48t
- catalyst_c9500-24q
- ws-c3650-48fqm
- catalyst_9800-l
- asr_1001-x
- catalyst_c9200l-48t-4x
- catalyst_9800-40
- catalyst_c9300-48uxm
- catalyst_c9200-48t
- asr_1006
- ws-c3650-48ts
- 111x_integrated_services_router
- ws-c3850-24s
- ws-c3650-12x48uz
- catalyst_c9200-48p
- catalyst_c9300l-48t-4g
- catalyst_c9200-24t
- 1120_integrated_services_router
- ws-c3650-24pd
- ws-c3650-24ts
- ws-c3650-48tq
- ws-c3850-12s
- catalyst_c9200l-24t-4g
- catalyst_c9300l-24t-4x
- asr_1001-hx
- catalyst_9800-l-c
- ws-c3650-24pdm
- catalyst_c9300-24s
- ws-c3650-24td
- catalyst_c9500-48y4c
- ws-c3650-48fs
- ws-c3850
- catalyst_9800-l-f
- ws-c3850-24u
- asr_1002-hx
- ws-c3650-48ps
- ws-c3850-24xs
- catalyst_c9300-48s
- ws-c3850-24xu
CWE
CWE-20
Improper Input Validation