A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
22 May 2023, 18:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco 1160 Integrated Services Router
Cisco 1120 Integrated Services Router Cisco 4331 Integrated Services Router Cisco 1111x Integrated Services Router Cisco 4221 Integrated Services Router Cisco 4431 Integrated Services Router Cisco 1100-4g Integrated Services Router Cisco 111x Integrated Services Router Cisco 4461 Integrated Services Router Cisco 1109 Integrated Services Router Cisco 1101 Integrated Services Router Cisco 1131 Integrated Services Router Cisco 1100-6g Integrated Services Router |
|
CPE | cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-6g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1131:-:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* |
25 Apr 2022, 15:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:cisco:isr_4461:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-4g:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4431:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1101:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1109:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4331:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_4221:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1160:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1111x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1131:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:isr_1100-6g:-:*:*:*:*:*:*:* |
|
CWE | CWE-755 | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4 - Vendor Advisory | |
First Time |
Cisco catalyst 8300-1n1s-6t
Cisco Cisco isr 4221 Cisco isr 1111x Cisco isr 1109 Cisco catalyst 8000v Edge Cisco cloud Services Router 1000v Cisco catalyst 8500l Cisco catalyst 8300-2n2s-4t2x Cisco isr 4461 Cisco isr 1120 Cisco ios Xe Cisco catalyst 8500 Cisco asr 1002-x Cisco catalyst 8300-2n2s-6t Cisco catalyst 8300-1n1s-4t2x Cisco isr 4331 Cisco isr 1160 Cisco catalyst 8500-4qc Cisco isr 4431 Cisco isr 1101 Cisco asr 1001-x Cisco isr 1100-6g Cisco isr 1100-4g Cisco isr 1131 Cisco isr 111x |
15 Apr 2022, 15:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-15 15:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-20678
Mitre link : CVE-2022-20678
CVE.ORG link : CVE-2022-20678
JSON object : View
Products Affected
cisco
- 1100-6g_integrated_services_router
- catalyst_8500-4qc
- catalyst_8500
- catalyst_8300-2n2s-6t
- 4431_integrated_services_router
- 4331_integrated_services_router
- catalyst_8300-2n2s-4t2x
- catalyst_8500l
- asr_1002-x
- 1109_integrated_services_router
- cloud_services_router_1000v
- catalyst_8300-1n1s-4t2x
- catalyst_8000v_edge
- ios_xe
- 1160_integrated_services_router
- 4461_integrated_services_router
- asr_1001-x
- catalyst_8300-1n1s-6t
- 1101_integrated_services_router
- 1120_integrated_services_router
- 1131_integrated_services_router
- 1100-4g_integrated_services_router
- 111x_integrated_services_router
- 4221_integrated_services_router
- 1111x_integrated_services_router