5
CVSSv2

CVE-2020-3162

Published: 15/04/2020 Updated: 12/08/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the Constrained Application Protocol (CoAP) implementation of Cisco IoT Field Network Director could allow an unauthenticated remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of incoming CoAP traffic. An attacker could exploit this vulnerability by sending a malformed CoAP packet to an affected device. A successful exploit could allow the malicious user to force the CoAP server to stop, interrupting communication to the IoT endpoints.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco iot field network director

Vendor Advisories

A vulnerability in the Constrained Application Protocol (CoAP) implementation of Cisco IoT Field Network Director could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device The vulnerability is due to insufficient input validation of incoming CoAP traffic An attacker could exploit this vulner ...