CVE-2022-20750

A vulnerability in the checkpoint manager implementation of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow an unauthenticated, remote attacker to cause the checkpoint manager process to restart upon receipt of malformed TCP data. This vulnerability is due to improper input validation of an ingress TCP packet. An attacker could exploit this vulnerability by sending crafted TCP data to the affected application. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the checkpoint manager process restarting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:redundancy_configuration_manager:*:*:*:*:*:staros:*:*

History

25 Feb 2022, 16:13

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-tcp-dos-2Wh8XjAQ - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-tcp-dos-2Wh8XjAQ - Vendor Advisory
CPE cpe:2.3:a:cisco:redundancy_configuration_manager:*:*:*:*:*:staros:*:*
CWE CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5

17 Feb 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-17 15:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-20750

Mitre link : CVE-2022-20750

CVE.ORG link : CVE-2022-20750


JSON object : View

Products Affected

cisco

  • redundancy_configuration_manager
CWE
CWE-20

Improper Input Validation