First published: Thu Sep 24 2020(Updated: )
A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.3.1 | |
Cisco IOS XE Web UI | =16.6.5 | |
Cisco IOS XE Web UI | =16.7\(1\) | |
Cisco IOS XE Web UI | =17.1.1 | |
Cisco Nexus 1000V for VMware vSphere | ||
Cisco 4321/k9 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4351/k9-rf Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco ASR 1000 Series | ||
Cisco ASR 1001 | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002 Fixed Router | ||
Cisco ASR 1002-X | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24PD-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24PS-E | ||
Cisco Catalyst 3650-24PS-L | ||
Cisco Catalyst 3650-24PS | ||
Cisco Catalyst 3650-24TD-E | ||
Cisco Catalyst 3650-24TD-L | ||
Cisco Catalyst 3650-24TD Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24TS-L | ||
Cisco Catalyst 3650-24TS-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQ-E | ||
Cisco Catalyst 3650-48FQ-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 Series Switch | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650-48PD-E | ||
Cisco Catalyst 3650-48PD | ||
Cisco Catalyst 3650-48PD-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48PQ-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48PS-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 Series | ||
Cisco Catalyst 3650-48TQ-S | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 9300-24s-e Firmware | ||
Cisco Catalyst 3850-24S-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-24T-L | ||
Cisco Catalyst 3850-24T-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48F-E | ||
Cisco Catalyst 3850-48F-L | ||
Cisco Catalyst 3850-48F-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48P-S | ||
Cisco Catalyst 3850-48T-E | ||
Cisco Catalyst 3850-48T-L | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 3850-48U-E | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48XS | ||
Cisco Catalyst 3850-48XS | ||
Cisco Catalyst 3850-48XS-S | ||
Cisco Catalyst 3850-12X48U-E | ||
Cisco Catalyst 3850-12X48U-L | ||
Cisco Catalyst 3850-12X48U-S | ||
Cisco IOS XE Web UI | =16.9.1 | |
Cisco IOS XE Web UI | =17.4.1 | |
Cisco 1100-4g/6g Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1109-4p Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Series Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1111x-8p | ||
Cisco 111x Integrated Services Router | ||
Cisco 111x Integrated Services Router | ||
Cisco 1120 Integrated Services Router | ||
Cisco 1160 Integrated Services Router | ||
Cisco 4321/k9-rf Integrated Services Router | ||
Cisco 4321/k9-ws Integrated Services Router | ||
Cisco 4321 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4331/k9-ws Integrated Services Router | ||
Cisco 4331 Integrated Services Router | ||
Cisco 4351/k9-rf Integrated Services Router | ||
Cisco 4351/k9 Integrated Services Router | ||
Cisco 4351/k9 Integrated Services Router | ||
Cisco 4441 Integrated Services Router | ||
Cisco ASR 1000 series software | ||
Cisco ASR 1001 | ||
Cisco ASR 1002 Fixed Router | ||
Cisco ASR 1004 | ||
Cisco ASR 1006 | ||
Cisco ASR 1013 | ||
Cisco ASR 1023 Router | ||
Cisco Cloud Services Router 1000V |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3508 has been rated as high severity due to its potential to allow unauthenticated attackers to disrupt device operations.
To fix CVE-2020-3508, you should upgrade your Cisco IOS XE software to the latest version that has addressed this vulnerability.
CVE-2020-3508 affects Cisco IOS XE versions 16.3.1, 16.6.5, 16.7(1), 17.1.1, 16.9.1, and 17.4.1.
CVE-2020-3508 affects Cisco ASR 1000 Series routers with the 20-Gbps Embedded Services Processor.
No, CVE-2020-3508 requires an unauthenticated, adjacent attacker to exploit the vulnerability.