First published: Wed Apr 15 2020(Updated: )
A vulnerability in the Constrained Application Protocol (CoAP) implementation of Cisco IoT Field Network Director could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of incoming CoAP traffic. An attacker could exploit this vulnerability by sending a malformed CoAP packet to an affected device. A successful exploit could allow the attacker to force the CoAP server to stop, interrupting communication to the IoT endpoints.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3162 is a vulnerability in the Constrained Application Protocol (CoAP) implementation of Cisco IoT Field Network Director that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition.
CVE-2020-3162 has a severity rating of 7.5 (high).
Cisco IoT Field Network Director version up to but not including 4.6.0 is affected by CVE-2020-3162.
CVE-2020-3162 can be exploited by an unauthenticated remote attacker to cause a denial of service (DoS) condition on the affected device.