CVE-2020-3409

A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to crash and reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to insufficient processing logic for crafted PROFINET packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted PROFINET packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to crash and reload, resulting in a DoS condition on the device.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ios:15.2\(7\)e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.2\(7\)e:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:ie-4000-16gt4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-16t4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-4s8p4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-4t4p4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-4tc4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-8gs4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-8gt4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-8s4g-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-4000-8t4g-e:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:16.11.1a:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:ie-3200-8p2s-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3200-8t2s-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3300-8p2s-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3300-8p2s-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3300-8t2s-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3300-8t2s-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3300-8t2x-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3300-8t2x-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3400-8p2s-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3400-8p2s-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ie-3400-8t2s-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-14t2s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-16p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-16t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-6t2s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-8p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-8s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3300-8t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3400-8p:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3400-8s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:iem-3400-8t:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB - Vendor Advisory

27 Oct 2022, 15:47

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:ios:16.11.1a:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios:16.11.1a:*:*:*:*:*:*:*

Information

Published : 2020-09-24 18:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3409

Mitre link : CVE-2020-3409

CVE.ORG link : CVE-2020-3409


JSON object : View

Products Affected

cisco

  • ie-3300-8p2s-a
  • ios
  • iem-3300-16t
  • iem-3300-16p
  • ie-3400-8p2s-e
  • ie-4000-8gs4g-e
  • iem-3300-8p
  • ie-4000-4tc4g-e
  • ie-3300-8p2s-e
  • iem-3400-8p
  • ie-4000-4gs8gp4g-e
  • ie-3300-8t2x-a
  • iem-3300-14t2s
  • ie-4000-16t4g-e
  • iem-3300-8t
  • ie-4000-8s4g-e
  • ie-4000-8gt8gp4g-e
  • ios_xe
  • iem-3300-8s
  • ie-4000-4gc4gp4g-e
  • ie-3200-8p2s-e
  • ie-3300-8t2s-a
  • iem-3400-8t
  • ie-3400-8t2s-e
  • ie-4000-16gt4g-e
  • ie-3200-8t2s-e
  • ie-4000-8gt4g-e
  • ie-4000-8t4g-e
  • ie-3300-8t2s-e
  • ie-3400-8p2s-a
  • ie-4000-4t4p4g-e
  • ie-3300-8t2x-e
  • iem-3300-6t2s
  • iem-3400-8s
  • ie-4000-4s8p4g-e
CWE
CWE-20

Improper Input Validation

CWE-400

Uncontrolled Resource Consumption