A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 8.6 |
22 May 2023, 18:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco 1111x Integrated Services Router
Cisco 4461 Integrated Services Router Cisco 1109 Integrated Services Router Cisco 1100-6g Integrated Services Router Cisco 1160 Integrated Services Router Cisco 1120 Integrated Services Router Cisco 1131 Integrated Services Router Cisco 4221 Integrated Services Router Cisco 1101 Integrated Services Router Cisco 1100-4g Integrated Services Router Cisco 111x Integrated Services Router Cisco 4331 Integrated Services Router Cisco 4431 Integrated Services Router |
|
CPE | cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1131:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-6g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-4g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* |
Information
Published : 2022-04-15 15:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20678
Mitre link : CVE-2022-20678
CVE.ORG link : CVE-2022-20678
JSON object : View
Products Affected
cisco
- 4221_integrated_services_router
- catalyst_8500l
- catalyst_8500-4qc
- 1160_integrated_services_router
- 1101_integrated_services_router
- 1100-4g_integrated_services_router
- 1131_integrated_services_router
- ios_xe
- cloud_services_router_1000v
- asr_1002-x
- catalyst_8300-1n1s-4t2x
- 1100-6g_integrated_services_router
- asr_1001-x
- 1109_integrated_services_router
- catalyst_8300-2n2s-6t
- catalyst_8000v_edge
- 4461_integrated_services_router
- catalyst_8500
- 4331_integrated_services_router
- 111x_integrated_services_router
- catalyst_8300-1n1s-6t
- 1111x_integrated_services_router
- 4431_integrated_services_router
- catalyst_8300-2n2s-4t2x
- 1120_integrated_services_router