First published: Thu Sep 24 2020(Updated: )
A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =15.8\(3\)m3 | |
Cisco 1100-4g/6g Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1109-4p Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Series Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1111x-8p | ||
Cisco 111x Integrated Services Router | ||
Cisco 111x Integrated Services Router | ||
Cisco 1120 Integrated Services Router | ||
Cisco 1160 Integrated Services Router | ||
Cisco 4221 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4451-X Integrated Services Router | ||
Cisco 4441 Integrated Services Router | ||
Cisco ASR 1000 series software | ||
Cisco ASR 1001 | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002 Fixed Router | ||
Cisco ASR 1002-X | ||
Cisco ASR 1004 | ||
Cisco ASR 1006 | ||
Cisco ASR 1013 | ||
Cisco ASR 1001-HX | ||
Cisco ASR 1001-HX-RF | ||
Cisco ASR 1001-X | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002-HX | ||
Cisco ASR 1002-HX | ||
Cisco ASR 1002-HX | ||
Cisco ASR 1002-X | ||
Cisco ASR 1002-X | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-CL | ||
Cisco Catalyst 9800-L | ||
Cisco Catalyst 9800-L | ||
Cisco Catalyst 9800-L | ||
Cisco Catalyst C9200 | ||
Cisco Catalyst 9200 Series | ||
Cisco Catalyst C9200-48P | ||
Cisco Catalyst 9200 Series | ||
Cisco Catalyst C9200L-24P-4G | ||
Cisco Catalyst C9200L-24P-4X | ||
Cisco Catalyst C9200L-24PXG-2Y | ||
Cisco Catalyst C9200L-24PXG-4X | ||
Cisco Catalyst C9200L-24T-4G | ||
Cisco Catalyst C9200L-24T-4X | ||
Cisco Catalyst C9200L-48P-4G | ||
Cisco Catalyst C9200L-48P-4X | ||
Cisco Catalyst C9200L-48PXG-2Y | ||
Cisco Catalyst C9200L-48PXG-4X | ||
Cisco Catalyst C9200L-48T-4G | ||
Cisco Catalyst C9200L-48T-4X | ||
Cisco Catalyst C9300-24P | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst 9300-24T-A | ||
Cisco Catalyst C9300-24U | ||
Cisco Catalyst 9300-24UX | ||
Cisco Catalyst C9300-48P | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst 9300-48U | ||
Cisco Catalyst C9300 Series | ||
Cisco Catalyst C9300-48UXM | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst C9300L-24P-4X | ||
Cisco Catalyst 9300L-24T-4G | ||
Cisco Catalyst 9300 | ||
Cisco Catalyst C9300L-48P-4G | ||
Cisco Catalyst 9300 Series Switches | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst C9300L-48T-4X | ||
Cisco Catalyst C9404R | ||
Cisco Catalyst 9407R | ||
Cisco Catalyst 9410R | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst C9500-24Y4C | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst C9500-32QC | ||
Cisco Catalyst C9500-40x | ||
Cisco Catalyst C9500-48Y4C | ||
Cisco Cloud Services Router 1000V | ||
Cisco Catalyst 3650 Series Switches | ||
Cisco Catalyst 3650-12X48UR | ||
Cisco Catalyst 3650 Series Switch | ||
Cisco Catalyst 3650 Series Switch | ||
Cisco Catalyst 3650 24 Port PoE Switch (WS-C3650-24PD) | ||
Cisco Catalyst 3650-24PS | ||
Cisco Catalyst 3650-24TD Switch | ||
Cisco Catalyst 3650-24TS | ||
Cisco Catalyst 3650 Series Switch | ||
Cisco Catalyst 3650-48FQ Switch | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650-48PD | ||
Cisco Catalyst 3650 Series Switches | ||
Cisco Catalyst 3650-48PS | ||
Cisco Catalyst 3650 Series Switches | ||
Cisco Catalyst 3650 48TQ | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-8X24UQ | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 Series Switches | ||
Cisco Catalyst 3850 Series Switch | ||
Cisco Catalyst 3850 Switch (model WS-C3850-12XS) | ||
Cisco Catalyst 3850 Series Switch | ||
Cisco Catalyst 3850 Series Switches | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 Series Switch | ||
Cisco Catalyst 3850 Switch | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850 48F Switch | ||
Cisco Catalyst 3850 48 Port PoE Switch | ||
Cisco Catalyst 3850 Series Switches | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850 Series Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3407 has a severity rating of high due to its potential impact on device availability.
To mitigate CVE-2020-3407, update your Cisco IOS XE software to a fixed version as recommended by Cisco.
CVE-2020-3407 affects multiple versions of Cisco IOS XE software, specifically 15.8(3)m3.
An unauthenticated remote attacker could exploit CVE-2020-3407 to cause the affected device to reload.
Currently, there are no published workarounds for CVE-2020-3407; updating to a fixed version is recommended.