First published: Fri Apr 15 2022(Updated: )
Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst Digital Building Series Switches Firmware | <=15.2\(7\)e | |
Cisco Ios Rommon | ||
Cisco Catalyst Digital Building Series Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20731 is high with a severity value of 6.8.
Cisco Catalyst Digital Building Series Switches Firmware, Cisco IOS Rommon, and Cisco Catalyst Digital Building Series Switches are affected by CVE-2022-20731.
An attacker can execute persistent code at boot time or permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition.
Cisco has released software updates to address the vulnerabilities. Please refer to the Cisco Security Advisory for more information and apply the necessary updates.
You can find more information about CVE-2022-20731 in the Cisco Security Advisory.