Impact
An improper validation of user‑supplied input in the HTTP Server feature of Cisco IOS Software and IOS XE Software Release 3E allows an attacker who can authenticate to a device to send malicious HTTP requests that trigger a watchdog timer expiry and force the device to reload. The reload terminates all services, producing a denial‑of‑service impact on availability.
Affected Systems
Any Cisco IOS Software or Cisco IOS XE Software device running Release 3E with the HTTP Server feature enabled is affected. An authenticated attacker can bring the device offline through this vulnerability.
Risk and Exploitability
The CVSS score of 7.7 indicates high severity, and the lack of an EPSS score and absence from the KEV catalog suggest limited public exploitation. Attacks require valid credentials, but once authenticated the attacker can construct and send malformed HTTP requests to trigger the reload. Prompt patching is advised to maintain service availability.
OpenCVE Enrichment