A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1000v
Subscribe
1100-4g Integrated Services Router
Subscribe
1100-4gltegb Integrated Services Router
Subscribe
1100-4gltena Integrated Services Router
Subscribe
1100-4p Integrated Services Router
Subscribe
1100-6g Integrated Services Router
Subscribe
1100-8p Integrated Services Router
Subscribe
1100-lte Integrated Services Router
Subscribe
1100 Integrated Services Router
Subscribe
1101-4p Integrated Services Router
Subscribe
1101 Integrated Services Router
Subscribe
1109-2p Integrated Services Router
Subscribe
1109-4p Integrated Services Router
Subscribe
1109 Integrated Services Router
Subscribe
1111x-8p Integrated Services Router
Subscribe
1111x Integrated Services Router
Subscribe
111x Integrated Services Router
Subscribe
1120 Integrated Services Router
Subscribe
1160 Integrated Services Router
Subscribe
4321\/k9-rf Integrated Services Router
Subscribe
4321\/k9-ws Integrated Services Router
Subscribe
4321\/k9 Integrated Services Router
Subscribe
4321 Integrated Services Router
Subscribe
4331\/k9-rf Integrated Services Router
Subscribe
4331\/k9-ws Integrated Services Router
Subscribe
4331\/k9 Integrated Services Router
Subscribe
4331 Integrated Services Router
Subscribe
4351\/k9-rf Integrated Services Router
Subscribe
4351\/k9-ws Integrated Services Router
Subscribe
4351\/k9 Integrated Services Router
Subscribe
4351 Integrated Services Router
Subscribe
4431 Integrated Services Router
Subscribe
4461 Integrated Services Router
Subscribe
Asr 1000
Subscribe
Asr 1000-x
Subscribe
Asr 1001
Subscribe
Asr 1001-hx
Subscribe
Asr 1001-x
Subscribe
Asr 1002
Subscribe
Asr 1002-hx
Subscribe
Asr 1002-x
Subscribe
Asr 1004
Subscribe
Asr 1006
Subscribe
Asr 1013
Subscribe
Asr 1023
Subscribe
Catalyst 3650-12x48fd-e
Subscribe
Catalyst 3650-12x48fd-l
Subscribe
Catalyst 3650-12x48fd-s
Subscribe
Catalyst 3650-24pd-e
Subscribe
Catalyst 3650-24pd-l
Subscribe
Catalyst 3650-24pd-s
Subscribe
Catalyst 3650-24pdm-e
Subscribe
Catalyst 3650-24pdm-l
Subscribe
Catalyst 3650-24pdm-s
Subscribe
Catalyst 3650-24ps-e
Subscribe
Catalyst 3650-24ps-l
Subscribe
Catalyst 3650-24ps-s
Subscribe
Catalyst 3650-24td-e
Subscribe
Catalyst 3650-24td-l
Subscribe
Catalyst 3650-24td-s
Subscribe
Catalyst 3650-24ts-e
Subscribe
Catalyst 3650-24ts-l
Subscribe
Catalyst 3650-24ts-s
Subscribe
Catalyst 3650-48fd-e
Subscribe
Catalyst 3650-48fd-l
Subscribe
Catalyst 3650-48fd-s
Subscribe
Catalyst 3650-48fq-e
Subscribe
Catalyst 3650-48fq-l
Subscribe
Catalyst 3650-48fq-s
Subscribe
Catalyst 3650-48fqm-e
Subscribe
Catalyst 3650-48fqm-l
Subscribe
Catalyst 3650-48fqm-s
Subscribe
Catalyst 3650-48fs-e
Subscribe
Catalyst 3650-48fs-l
Subscribe
Catalyst 3650-48fs-s
Subscribe
Catalyst 3650-48pd-e
Subscribe
Catalyst 3650-48pd-l
Subscribe
Catalyst 3650-48pd-s
Subscribe
Catalyst 3650-48pq-e
Subscribe
Catalyst 3650-48pq-l
Subscribe
Catalyst 3650-48pq-s
Subscribe
Catalyst 3650-48ps-e
Subscribe
Catalyst 3650-48ps-l
Subscribe
Catalyst 3650-48ps-s
Subscribe
Catalyst 3650-48td-e
Subscribe
Catalyst 3650-48td-l
Subscribe
Catalyst 3650-48td-s
Subscribe
Catalyst 3650-48tq-e
Subscribe
Catalyst 3650-48tq-l
Subscribe
Catalyst 3650-48tq-s
Subscribe
Catalyst 3650-48ts-e
Subscribe
Catalyst 3650-48ts-l
Subscribe
Catalyst 3650-48ts-s
Subscribe
Catalyst 3650-8x24pd-e
Subscribe
Catalyst 3650-8x24pd-l
Subscribe
Catalyst 3650-8x24pd-s
Subscribe
Catalyst 3850-12s-e
Subscribe
Catalyst 3850-12s-s
Subscribe
Catalyst 3850-12xs-e
Subscribe
Catalyst 3850-12xs-s
Subscribe
Catalyst 3850-16xs-e
Subscribe
Catalyst 3850-16xs-s
Subscribe
Catalyst 3850-24p-e
Subscribe
Catalyst 3850-24p-l
Subscribe
Catalyst 3850-24p-s
Subscribe
Catalyst 3850-24s-e
Subscribe
Catalyst 3850-24s-s
Subscribe
Catalyst 3850-24t-e
Subscribe
Catalyst 3850-24t-l
Subscribe
Catalyst 3850-24t-s
Subscribe
Catalyst 3850-24u-e
Subscribe
Catalyst 3850-24u-l
Subscribe
Catalyst 3850-24u-s
Subscribe
Catalyst 3850-24xs-e
Subscribe
Catalyst 3850-24xs-s
Subscribe
Catalyst 3850-24xu-e
Subscribe
Catalyst 3850-24xu-l
Subscribe
Catalyst 3850-24xu-s
Subscribe
Catalyst 3850-32xs-e
Subscribe
Catalyst 3850-32xs-s
Subscribe
Catalyst 3850-48f-e
Subscribe
Catalyst 3850-48f-l
Subscribe
Catalyst 3850-48f-s
Subscribe
Catalyst 3850-48p-e
Subscribe
Catalyst 3850-48p-l
Subscribe
Catalyst 3850-48p-s
Subscribe
Catalyst 3850-48t-e
Subscribe
Catalyst 3850-48t-l
Subscribe
Catalyst 3850-48t-s
Subscribe
Catalyst 3850-48u-e
Subscribe
Catalyst 3850-48u-l
Subscribe
Catalyst 3850-48u-s
Subscribe
Catalyst 3850-48xs-e
Subscribe
Catalyst 3850-48xs-f-e
Subscribe
Catalyst 3850-48xs-f-s
Subscribe
Catalyst 3850-48xs-s
Subscribe
Catalyst C3850-12x48u-e
Subscribe
Catalyst C3850-12x48u-l
Subscribe
Catalyst C3850-12x48u-s
Subscribe
Csr1000v
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24779 | A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T18:00:09.880Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3508
Updated: 2024-08-04T07:37:54.688Z
Status : Modified
Published: 2020-09-24T18:15:20.963
Modified: 2024-11-21T05:31:12.983
Link: CVE-2020-3508
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD