Multiple vulnerabilities in the web management framework of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to gain unauthorized read access to sensitive data or cause the web management software to hang or crash, resulting in a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
22 May 2023, 18:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* |
07 Oct 2021, 20:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:isr_1100_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1009-x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006-x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120_router:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* |
05 Oct 2021, 14:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:asr_1002-x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-hx_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1004_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1013_router:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:* |
Information
Published : 2020-09-24 18:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-3474
Mitre link : CVE-2020-3474
CVE.ORG link : CVE-2020-3474
JSON object : View
Products Affected
cisco
- ws-c3850-12x48u
- ws-c3850-24xu
- catalyst_c9300l-48p-4x
- asr_1004
- ws-c3850-24xs
- catalyst_c9300l-24p-4g
- catalyst_c9300-24s
- catalyst_c9200l-48p-4x
- catalyst_c9300-48un
- catalyst_c9200-48p
- catalyst_c9300-48uxm
- 1109_integrated_services_router
- catalyst_c9200-24p
- catalyst_c9500-12q
- catalyst_c9300l-48p-4g
- catalyst_c9300l-24p-4x
- ws-c3650-48fd
- ws-c3650-48fs
- catalyst_c9200l-24t-4x
- catalyst_c9200-48t
- asr_1001-hx
- catalyst_c9300-24t
- catalyst_9800-80
- catalyst_9800-l-c
- ws-c3650-12x48ur
- ws-c3850-12s
- ws-c3650-48pd
- catalyst_c9300-48p
- catalyst_9800-40
- catalyst_c9500-32c
- asr_1013
- catalyst_c9300-24ux
- catalyst_9800-cl
- ws-c3850-24u
- catalyst_c9500-24y4c
- ws-c3850-12xs
- catalyst_c9200l-24p-4x
- asr_1006-x
- ws-c3850-24p
- ws-c3650-48pq
- ws-c3650-48tq
- catalyst_c9200l-24pxg-4x
- ws-c3850-48u
- ws-c3650-48fq
- asr_1002-hx
- ws-c3850-24t
- ws-c3850-24s
- ios_xe
- asr_1006
- catalyst_c9200l-48t-4g
- catalyst_c9200l-24pxg-2y
- catalyst_c9500-32qc
- catalyst_c9300l-48t-4g
- catalyst_c9300-24p
- catalyst_c9300l-48t-4x
- ws-c3850
- ws-c3650-24pd
- catalyst_9800-l-f
- catalyst_c9200l-24t-4g
- ws-c3650-24ps
- catalyst_c9500-40x
- catalyst_c9500-16x
- catalyst_c9200l-48pxg-2y
- ws-c3650-12x48uz
- catalyst_c9200l-48t-4x
- ws-c3650-24ts
- catalyst_c9300l-24t-4g
- ws-c3650-24pdm
- asr_1002-x
- 1101_integrated_services_router
- ws-c3650-48ps
- ws-c3650-48ts
- catalyst_c9200l-48pxg-4x
- ws-c3850-48f
- 1120_integrated_services_router
- ws-c3650-12x48uq
- catalyst_c9500-48y4c
- asr_1009-x
- catalyst_c9300l-24t-4x
- 1111x_integrated_services_router
- catalyst_c9300-48t
- catalyst_c9500-24q
- catalyst_c9300-48s
- ws-c3650-8x24uq
- catalyst_c9200l-24p-4g
- ws-c3650-24td
- asr_1001-x
- 1100_integrated_services_router
- ws-c3650-48fqm
- catalyst_c9300-24u
- catalyst_c9200-24t
- 1160_integrated_services_router
- ws-c3650-48td
- catalyst_c9200l-48p-4g
- ws-c3850-48t
- ws-c3850-48p
- ws-c3850-48xs
- catalyst_c9300-48u
- 111x_integrated_services_router
- catalyst_9800-l