8.6
CVSSv3

CVE-2020-3221

Published: 03/06/2020 Updated: 17/09/2021
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 8.6 | Impact Score: 4 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of parameters in a Flexible NetFlow Version 9 record. An attacker could exploit this vulnerability by sending a malformed Flexible NetFlow Version 9 packet to the Control and Provisioning of Wireless Access Points (CAPWAP) data port of an affected device. An exploit could allow the malicious user to trigger an infinite loop, resulting in a process crash that would cause a reload of the device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios_xe 16.10.1

cisco ios_xe 16.10.1a

cisco ios_xe 16.10.1b

cisco ios_xe 16.10.1e

cisco ios_xe 16.10.1s

cisco ios_xe 16.10.2

cisco ios_xe 16.11.1

cisco ios_xe 16.11.1a

cisco ios_xe 16.11.1b

cisco ios_xe 16.11.1c

cisco ios_xe 16.11.1s

cisco ios_xe 16.12.1

cisco ios_xe 16.12.1a

cisco ios_xe 16.12.1c

cisco ios_xe 16.12.1s

cisco ios_xe 16.12.1t

Vendor Advisories

A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device The vulnerability is due to improper validation of parameters in a Flexible NetFlow Versio ...