Multiple vulnerabilities in the Zone-Based Firewall feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload or stop forwarding traffic through the firewall. The vulnerabilities are due to incomplete handling of Layer 4 packets through the device. An attacker could exploit these vulnerabilities by sending a certain sequence of traffic patterns through the device. A successful exploit could allow the attacker to cause the device to reload or stop forwarding traffic through the firewall, resulting in a denial of service. For more information about these vulnerabilities, see the Details section of this advisory.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1100 Integrated Services Router
Subscribe
1101 Integrated Services Router
Subscribe
1109 Integrated Services Router
Subscribe
1111x Integrated Services Router
Subscribe
111x Integrated Services Router
Subscribe
1120 Integrated Services Router
Subscribe
1160 Integrated Services Router
Subscribe
4221 Integrated Services Router
Subscribe
4321 Integrated Services Router
Subscribe
4331 Integrated Services Router
Subscribe
4351 Integrated Services Router
Subscribe
4431 Integrated Services Router
Subscribe
4451-x Integrated Services Router
Subscribe
4461 Integrated Services Router
Subscribe
Asr 1001-hx
Subscribe
Asr 1001-x
Subscribe
Asr 1002-hx
Subscribe
Asr 1002-x
Subscribe
Asr 1004
Subscribe
Asr 1006
Subscribe
Asr 1006-x
Subscribe
Asr 1009-x
Subscribe
Asr 1013
Subscribe
Cloud Services Router 1000v
Subscribe
Integrated Services Virtual Router
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24751 | Multiple vulnerabilities in the Zone-Based Firewall feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload or stop forwarding traffic through the firewall. The vulnerabilities are due to incomplete handling of Layer 4 packets through the device. An attacker could exploit these vulnerabilities by sending a certain sequence of traffic patterns through the device. A successful exploit could allow the attacker to cause the device to reload or stop forwarding traffic through the firewall, resulting in a denial of service. For more information about these vulnerabilities, see the Details section of this advisory. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T17:58:19.424Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3480
Updated: 2024-08-04T07:37:54.305Z
Status : Modified
Published: 2020-09-24T18:15:20.120
Modified: 2024-11-21T05:31:09.360
Link: CVE-2020-3480
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD