First published: Wed Jun 03 2020(Updated: )
A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. The vulnerability is due to insufficient verification of authenticity of received Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by tampering with ESP cleartext values as a man-in-the-middle.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =16.4.1 | |
Cisco IOS XE | =16.4.2 | |
Cisco IOS XE | =16.4.3 | |
Cisco IOS XE | =16.5.1 | |
Cisco IOS XE | =16.5.1a | |
Cisco IOS XE | =16.5.1b | |
Cisco IOS XE | =16.5.2 | |
Cisco IOS XE | =16.5.3 | |
Cisco IOS XE | =16.6.1 | |
Cisco IOS XE | =16.6.2 | |
Cisco IOS XE | =16.6.3 | |
Cisco IOS XE | =16.6.4 | |
Cisco IOS XE | =16.6.4a | |
Cisco IOS XE | =16.6.4s | |
Cisco IOS XE | =16.6.5 | |
Cisco IOS XE | =16.6.5a | |
Cisco IOS XE | =16.6.5b | |
Cisco IOS XE | =16.6.6 | |
Cisco IOS XE | =16.7.1 | |
Cisco IOS XE | =16.7.1a | |
Cisco IOS XE | =16.7.1b | |
Cisco IOS XE | =16.7.2 | |
Cisco IOS XE | =16.7.3 | |
Cisco IOS XE | =16.7.4 | |
Cisco IOS XE | =16.8.1 | |
Cisco IOS XE | =16.8.1a | |
Cisco IOS XE | =16.8.1b | |
Cisco IOS XE | =16.8.1c | |
Cisco IOS XE | =16.8.1d | |
Cisco IOS XE | =16.8.1e | |
Cisco IOS XE | =16.8.1s | |
Cisco IOS XE | =16.8.2 | |
Cisco IOS XE | =16.8.3 | |
Cisco IOS XE | =16.9.1 | |
Cisco IOS XE | =16.9.1a | |
Cisco IOS XE | =16.9.1b | |
Cisco IOS XE | =16.9.1c | |
Cisco IOS XE | =16.9.1d | |
Cisco IOS XE | =16.9.1s | |
Cisco IOS XE | =16.9.2 | |
Cisco IOS XE | =16.9.2a | |
Cisco IOS XE | =16.9.2s | |
Cisco IOS XE | =16.9.3 | |
Cisco IOS XE | =16.9.3a | |
Cisco IOS XE | =16.9.3h | |
Cisco IOS XE | =16.9.3s | |
Cisco IOS XE | =16.10.1 | |
Cisco IOS XE | =16.10.1a | |
Cisco IOS XE | =16.10.1b | |
Cisco IOS XE | =16.10.1c | |
Cisco IOS XE | =16.10.1d | |
Cisco IOS XE | =16.10.1e | |
Cisco IOS XE | =16.10.1f | |
Cisco IOS XE | =16.10.1g | |
Cisco IOS XE | =16.10.1s | |
Cisco IOS XE | =16.10.2 | |
Cisco IOS XE | =16.11.1 | |
Cisco IOS XE | =16.11.1a | |
Cisco IOS XE | =16.11.1b | |
Cisco IOS XE | =16.11.1c | |
Cisco IOS XE | =16.11.1s | |
Cisco IOS XE | =16.12.1 | |
Cisco IOS XE | =16.12.1a | |
Cisco IOS XE | =16.12.1c | |
Cisco IOS XE | =16.12.1s | |
Cisco IOS XE | =16.12.1t | |
Cisco IOS XE | =16.12.1w | |
Cisco IOS XE | =16.12.1y |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3220 has been classified as a high severity vulnerability.
To fix CVE-2020-3220, upgrade your affected Cisco IOS XE Software to a version that addresses this vulnerability.
CVE-2020-3220 affects Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers running specific versions of Cisco IOS XE.
CVE-2020-3220 allows an unauthenticated remote attacker to disconnect legitimate IPsec VPN sessions.
There are no documented workarounds for CVE-2020-3220; updating to a patched version is recommended.