7.7
CWE
20 118
Advisory Published
Updated

CVE-2020-3235: Input Validation

First published: Wed Jun 03 2020(Updated: )

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the software processes specific SNMP object identifiers. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: To exploit this vulnerability by using SNMPv2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability by using SNMPv3, the attacker must know the user credentials for the affected system.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco IOS=12.2\(52\)sg
Cisco IOS=12.2\(53\)sg1
Cisco IOS=12.2\(53\)sg2
Cisco IOS=12.2\(53\)sg3
Cisco IOS=12.2\(53\)sg4
Cisco IOS=12.2\(53\)sg5
Cisco IOS=12.2\(53\)sg6
Cisco IOS=12.2\(53\)sg7
Cisco IOS=12.2\(53\)sg8
Cisco IOS=12.2\(53\)sg9
Cisco IOS=12.2\(53\)sg10
Cisco IOS=12.2\(53\)sg11
Cisco IOS=12.2\(54\)sg
Cisco IOS=12.2\(54\)sg1
Cisco IOS=12.2\(54\)wo
Cisco IOS=15.0\(1\)ey
Cisco IOS=15.0\(1\)ey2
Cisco IOS=15.0\(1\)xo
Cisco IOS=15.0\(1\)xo1
Cisco IOS=15.0\(2\)ex2
Cisco IOS=15.0\(2\)ex8
Cisco IOS=15.0\(2\)sg
Cisco IOS=15.0\(2\)sg1
Cisco IOS=15.0\(2\)sg2
Cisco IOS=15.0\(2\)sg3
Cisco IOS=15.0\(2\)sg4
Cisco IOS=15.0\(2\)sg5
Cisco IOS=15.0\(2\)sg6
Cisco IOS=15.0\(2\)sg7
Cisco IOS=15.0\(2\)sg8
Cisco IOS=15.0\(2\)sg9
Cisco IOS=15.0\(2\)sg10
Cisco IOS=15.0\(2\)sg11
Cisco IOS=15.0\(2\)xo
Cisco IOS=15.1\(1\)sg
Cisco IOS=15.1\(1\)sg1
Cisco IOS=15.1\(1\)sg2
Cisco IOS=15.1\(2\)sg
Cisco IOS=15.1\(2\)sg1
Cisco IOS=15.1\(2\)sg2
Cisco IOS=15.1\(2\)sg3
Cisco IOS=15.1\(2\)sg4
Cisco IOS=15.1\(2\)sg5
Cisco IOS=15.1\(2\)sg6
Cisco IOS=15.1\(2\)sg7
Cisco IOS=15.1\(2\)sg8
Cisco IOS=15.2\(1\)e
Cisco IOS=15.2\(1\)e1
Cisco IOS=15.2\(1\)e3
Cisco IOS=15.2\(2\)e
Cisco IOS=15.2\(2\)e1
Cisco IOS=15.2\(2\)e2
Cisco IOS=15.2\(2\)e3
Cisco IOS=15.2\(2\)e4
Cisco IOS=15.2\(2\)e5
Cisco IOS=15.2\(2\)e5a
Cisco IOS=15.2\(2\)e5b
Cisco IOS=15.2\(2\)e6
Cisco IOS=15.2\(2\)e7
Cisco IOS=15.2\(2\)e7b
Cisco IOS=15.2\(2\)e8
Cisco IOS=15.2\(2\)e9
Cisco IOS=15.2\(2\)e9a
Cisco IOS=15.2\(2\)e10
Cisco IOS=15.2\(2b\)e
Cisco IOS=15.2\(3\)e
Cisco IOS=15.2\(3\)e1
Cisco IOS=15.2\(3\)e2
Cisco IOS=15.2\(3\)e3
Cisco IOS=15.2\(3\)e4
Cisco IOS=15.2\(3\)e5
Cisco IOS=15.2\(4\)e
Cisco IOS=15.2\(4\)e1
Cisco IOS=15.2\(4\)e2
Cisco IOS=15.2\(4\)e3
Cisco IOS=15.2\(4\)e4
Cisco IOS=15.2\(4\)e5
Cisco IOS=15.2\(4\)e5a
Cisco IOS=15.2\(4\)e6
Cisco IOS=15.2\(4\)e7
Cisco IOS=15.2\(4\)e8
Cisco IOS=15.3\(3\)jpj
Cisco IOS XE=3.2.0sg
Cisco IOS XE=3.2.1sg
Cisco IOS XE=3.2.2sg
Cisco IOS XE=3.2.3sg
Cisco IOS XE=3.2.4sg
Cisco IOS XE=3.2.5sg
Cisco IOS XE=3.2.6sg
Cisco IOS XE=3.2.7sg
Cisco IOS XE=3.2.8sg
Cisco IOS XE=3.2.9sg
Cisco IOS XE=3.2.10sg
Cisco IOS XE=3.2.11sg
Cisco IOS XE=3.3.0sg
Cisco IOS XE=3.3.0xo
Cisco IOS XE=3.3.1sg
Cisco IOS XE=3.3.1xo
Cisco IOS XE=3.3.2sg
Cisco IOS XE=3.3.2xo
Cisco IOS XE=3.4.0sg
Cisco IOS XE=3.4.1sg
Cisco IOS XE=3.4.2sg
Cisco IOS XE=3.4.3sg
Cisco IOS XE=3.4.4sg
Cisco IOS XE=3.4.5sg
Cisco IOS XE=3.4.6sg
Cisco IOS XE=3.4.7sg
Cisco IOS XE=3.4.8sg
Cisco IOS XE=3.5.0e
Cisco IOS XE=3.5.1e
Cisco IOS XE=3.5.2e
Cisco IOS XE=3.5.3e
Cisco IOS XE=3.6.0be
Cisco IOS XE=3.6.0e
Cisco IOS XE=3.6.1e
Cisco IOS XE=3.6.3e
Cisco IOS XE=3.6.4e
Cisco IOS XE=3.6.5ae
Cisco IOS XE=3.6.5be
Cisco IOS XE=3.6.5e
Cisco IOS XE=3.6.6e
Cisco IOS XE=3.6.7e
Cisco IOS XE=3.6.8e
Cisco IOS XE=3.6.9e
Cisco IOS XE=3.6.10e
Cisco IOS XE=3.7.0e
Cisco IOS XE=3.7.1e
Cisco IOS XE=3.7.2e
Cisco IOS XE=3.7.3e
Cisco IOS XE=3.8.0e
Cisco IOS XE=3.8.1e
Cisco IOS XE=3.8.2e
Cisco IOS XE=3.8.3e
Cisco IOS XE=3.8.4e
Cisco IOS XE=3.8.5ae
Cisco IOS XE=3.8.5e
Cisco IOS XE=3.8.6e
Cisco IOS XE=3.8.7e
Cisco IOS XE=3.8.8e
Cisco IOS XE=3.9.0e
Cisco IOS XE=3.9.1e
Cisco IOS XE=3.9.2be
Cisco IOS XE=3.9.2e
Cisco IOS XE=3.10.0ce
Cisco IOS XE=3.10.0e
Cisco IOS XE=3.10.1ae
Cisco IOS XE=3.10.1e
Cisco IOS XE=3.10.1se
Cisco IOS XE=3.10.2e
Cisco Catalyst 4503-e
Cisco Catalyst 4506-e
Cisco Catalyst 4507r\+e
Cisco Catalyst 4510r\+e
Oracle Goldengate Management Pack=12.2.1.2.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203