First published: Wed Jun 03 2020(Updated: )
Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(60\)ez16 | |
Cisco IOS | =15.0\(2\)sg11a | |
Cisco IOS | =15.3\(3\)jaa1 | |
Cisco IOS | =15.3\(3\)jpj | |
Cisco IOS | =15.4\(1\)cg | |
Cisco IOS | =15.4\(2\)cg | |
Cisco IOS | =15.4\(3\)m | |
Cisco IOS | =15.4\(3\)m1 | |
Cisco IOS | =15.4\(3\)m2 | |
Cisco IOS | =15.4\(3\)m3 | |
Cisco IOS | =15.4\(3\)m4 | |
Cisco IOS | =15.4\(3\)m5 | |
Cisco IOS | =15.4\(3\)m6 | |
Cisco IOS | =15.4\(3\)m6a | |
Cisco IOS | =15.4\(3\)m7 | |
Cisco IOS | =15.4\(3\)m8 | |
Cisco IOS | =15.4\(3\)m9 | |
Cisco IOS | =15.4\(3\)m10 | |
Cisco IOS | =15.5\(1\)t | |
Cisco IOS | =15.5\(1\)t2 | |
Cisco IOS | =15.5\(1\)t3 | |
Cisco IOS | =15.5\(1\)t4 | |
Cisco IOS | =15.5\(2\)t | |
Cisco IOS | =15.5\(2\)t1 | |
Cisco IOS | =15.5\(2\)t2 | |
Cisco IOS | =15.5\(2\)t3 | |
Cisco IOS | =15.5\(2\)t4 | |
Cisco IOS | =15.5\(3\)m | |
Cisco IOS | =15.5\(3\)m0a | |
Cisco IOS | =15.5\(3\)m1 | |
Cisco IOS | =15.5\(3\)m2 | |
Cisco IOS | =15.5\(3\)m2a | |
Cisco IOS | =15.5\(3\)m3 | |
Cisco IOS | =15.5\(3\)m4 | |
Cisco IOS | =15.5\(3\)m4a | |
Cisco IOS | =15.5\(3\)m5 | |
Cisco IOS | =15.5\(3\)m6 | |
Cisco IOS | =15.5\(3\)m6a | |
Cisco IOS | =15.5\(3\)m7 | |
Cisco IOS | =15.5\(3\)m8 | |
Cisco IOS | =15.5\(3\)m9 | |
Cisco IOS | =15.5\(3\)m10 | |
Cisco IOS | =15.5\(3\)m11 | |
Cisco IOS | =15.6\(1\)t | |
Cisco IOS | =15.6\(1\)t0a | |
Cisco IOS | =15.6\(1\)t1 | |
Cisco IOS | =15.6\(1\)t2 | |
Cisco IOS | =15.6\(1\)t3 | |
Cisco IOS | =15.6\(2\)t | |
Cisco IOS | =15.6\(2\)t1 | |
Cisco IOS | =15.6\(2\)t2 | |
Cisco IOS | =15.6\(2\)t3 | |
Cisco IOS | =15.6\(3\)m | |
Cisco IOS | =15.6\(3\)m0a | |
Cisco IOS | =15.6\(3\)m1 | |
Cisco IOS | =15.6\(3\)m1b | |
Cisco IOS | =15.6\(3\)m2 | |
Cisco IOS | =15.6\(3\)m3 | |
Cisco IOS | =15.6\(3\)m3a | |
Cisco IOS | =15.6\(3\)m4 | |
Cisco IOS | =15.6\(3\)m5 | |
Cisco IOS | =15.6\(3\)m6 | |
Cisco IOS | =15.6\(3\)m6a | |
Cisco IOS | =15.6\(3\)m6b | |
Cisco IOS | =15.6\(3\)m7 | |
Cisco IOS | =15.6\(3\)m8 | |
Cisco IOS | =15.6\(3\)m9 | |
Cisco IOS | =15.7\(3\)m | |
Cisco IOS | =15.7\(3\)m1 | |
Cisco IOS | =15.7\(3\)m2 | |
Cisco IOS | =15.7\(3\)m3 | |
Cisco IOS | =15.7\(3\)m4 | |
Cisco IOS | =15.7\(3\)m4a | |
Cisco IOS | =15.7\(3\)m4b | |
Cisco IOS | =15.7\(3\)m5 | |
Cisco IOS | =15.7\(3\)m6 | |
Cisco IOS | =15.7\(3\)m7 | |
Cisco IOS | =15.8\(3\)m | |
Cisco IOS | =15.8\(3\)m0a | |
Cisco IOS | =15.8\(3\)m1 | |
Cisco IOS | =15.8\(3\)m2 | |
Cisco IOS | =15.8\(3\)m2a | |
Cisco IOS | =15.8\(3\)m3 | |
Cisco IOS | =15.8\(3\)m3a | |
Cisco IOS | =15.8\(3\)m3b | |
Cisco IOS | =15.8\(3\)m4 | |
Cisco IOS | =15.8\(3\)m5 | |
Cisco IOS | =15.9\(3\)m | |
Cisco IOS | =15.9\(3\)m0a | |
Cisco 1120 firmware | ||
Cisco 1240 | ||
Cisco IR809G-LTE-GA-K9 | ||
Cisco 829 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3199 has been assigned a severity rating of high, indicating significant risk for denial of service attacks.
To mitigate CVE-2020-3199, update the affected Cisco IOS software to a version that includes the security patches addressing this vulnerability.
CVE-2020-3199 affects Cisco 809 and 829 Industrial Integrated Services Routers and Cisco 1000 Series Connected Grid Routers running specific versions of Cisco IOS.
Exploitation of CVE-2020-3199 can lead to a denial of service, causing disruptions in network services.
Currently, there are no known effective workarounds for CVE-2020-3199 other than applying the recommended software updates.