A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 May 2023, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:isr4321\/k9:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4351\/k9:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4351\/k9-ws:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr1100-4gltena:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr1100-lte:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr1100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr1100-6g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4331\/k9-ws:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4331\/k9-rf:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4321\/k9-ws:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr1100-4g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr1100-4gltegb:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4321\/k9-rf:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr4351\/k9-rf:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:4351\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351\/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331\/k9_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4351\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:* |
22 May 2023, 18:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:isr_1100-8p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109-2p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x-8p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-4p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109-4p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101-4p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_422:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* |
Information
Published : 2020-09-24 18:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-3511
Mitre link : CVE-2020-3511
CVE.ORG link : CVE-2020-3511
JSON object : View
Products Affected
cisco
- asr1002-x-ws
- 4461_integrated_services_router
- asr_1000-x
- asr_1013
- 1100-4gltegb_integrated_services_router
- asr1001-x-rf
- asr_1004
- 1100-8p_integrated_services_router
- 1100-4gltena_integrated_services_router
- 4321\/k9-ws_integrated_services_router
- asr_1002
- asr1002-hx-ws
- asr1002-hx
- 4431_integrated_services_router
- csr1000v
- 422_integrated_services_router
- 4351\/k9-ws_integrated_services_router
- asr_1002-x
- 1109_integrated_services_router
- 1101_integrated_services_router
- asr_1001-x
- 1100_integrated_services_router
- 1109-4p_integrated_services_router
- 4331\/k9_integrated_services_router
- asr1001-x-ws
- asr1001-hx-rf
- 1160_integrated_services_router
- 1111x-8p_integrated_services_router
- 4331\/k9-ws_integrated_services_router
- asr1002-hx-rf
- 1100-4p_integrated_services_router
- ios_xe
- 1101-4p_integrated_services_router
- 4321\/k9_integrated_services_router
- asr_1001
- asr_1006
- asr1002-x-rf
- 1100-lte_integrated_services_router
- 1109-2p_integrated_services_router
- asr1001-x
- asr1001-hx
- asr1002-x
- 1120_integrated_services_router
- 1100-4g_integrated_services_router
- 4321\/k9-rf_integrated_services_router
- 4331\/k9-rf_integrated_services_router
- 111x_integrated_services_router
- 4351\/k9_integrated_services_router
- 1111x_integrated_services_router
- 4351\/k9-rf_integrated_services_router
- 1100-6g_integrated_services_router
CWE
CWE-20
Improper Input Validation