A vulnerability in the checkpoint manager implementation of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow an unauthenticated, remote attacker to cause the checkpoint manager process to restart upon receipt of malformed TCP data. This vulnerability is due to improper input validation of an ingress TCP packet. An attacker could exploit this vulnerability by sending crafted TCP data to the affected application. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the checkpoint manager process restarting.
History

Wed, 06 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2022-02-17T15:00:28.087491Z

Updated: 2024-11-06T16:30:18.474Z

Reserved: 2021-11-02T00:00:00

Link: CVE-2022-20750

cve-icon Vulnrichment

Updated: 2024-08-03T02:24:49.484Z

cve-icon NVD

Status : Modified

Published: 2022-02-17T15:15:09.517

Modified: 2024-11-21T06:43:28.550

Link: CVE-2022-20750

cve-icon Redhat

No data.