Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-3232

A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.9%
CVSS Severity
CVSS v3 Score 6.3
CVSS v2 Score 6.8
Products affected by CVE-2020-3232
  • Cisco » Asr 920-12sz-Im » Version: N/A
    cpe:2.3:h:cisco:asr_920-12sz-im:-
  • Cisco » Ios Xe » Version: 16.3.10
    cpe:2.3:o:cisco:ios_xe:16.3.10
  • Cisco » Ios Xe » Version: 16.5.1
    cpe:2.3:o:cisco:ios_xe:16.5.1
  • Cisco » Ios Xe » Version: 16.5.2
    cpe:2.3:o:cisco:ios_xe:16.5.2
  • Cisco » Ios Xe » Version: 16.5.3
    cpe:2.3:o:cisco:ios_xe:16.5.3
  • Cisco » Ios Xe » Version: 16.6.1
    cpe:2.3:o:cisco:ios_xe:16.6.1
  • Cisco » Ios Xe » Version: 16.6.2
    cpe:2.3:o:cisco:ios_xe:16.6.2
  • Cisco » Ios Xe » Version: 16.6.3
    cpe:2.3:o:cisco:ios_xe:16.6.3
  • Cisco » Ios Xe » Version: 16.6.4
    cpe:2.3:o:cisco:ios_xe:16.6.4
  • Cisco » Ios Xe » Version: 16.7.1
    cpe:2.3:o:cisco:ios_xe:16.7.1
  • Cisco » Ios Xe » Version: 16.7.2
    cpe:2.3:o:cisco:ios_xe:16.7.2
  • Cisco » Ios Xe » Version: 16.7.3
    cpe:2.3:o:cisco:ios_xe:16.7.3
  • Cisco » Ios Xe » Version: 16.8.1
    cpe:2.3:o:cisco:ios_xe:16.8.1
  • Cisco » Ios Xe » Version: 16.8.1a
    cpe:2.3:o:cisco:ios_xe:16.8.1a
  • Cisco » Ios Xe » Version: 16.8.1b
    cpe:2.3:o:cisco:ios_xe:16.8.1b
  • Cisco » Ios Xe » Version: 16.8.1c
    cpe:2.3:o:cisco:ios_xe:16.8.1c
  • Cisco » Ios Xe » Version: 16.8.1d
    cpe:2.3:o:cisco:ios_xe:16.8.1d
  • Cisco » Ios Xe » Version: 16.8.1e
    cpe:2.3:o:cisco:ios_xe:16.8.1e
  • Cisco » Ios Xe » Version: 16.8.1s
    cpe:2.3:o:cisco:ios_xe:16.8.1s
  • Cisco » Ios Xe » Version: 16.9.1
    cpe:2.3:o:cisco:ios_xe:16.9.1
  • Cisco » Ios Xe » Version: 16.9.1a
    cpe:2.3:o:cisco:ios_xe:16.9.1a
  • Cisco » Ios Xe » Version: 16.9.1b
    cpe:2.3:o:cisco:ios_xe:16.9.1b
  • Cisco » Ios Xe » Version: 16.9.1c
    cpe:2.3:o:cisco:ios_xe:16.9.1c
  • Cisco » Ios Xe » Version: 16.9.1d
    cpe:2.3:o:cisco:ios_xe:16.9.1d
  • Cisco » Ios Xe » Version: 16.9.1s
    cpe:2.3:o:cisco:ios_xe:16.9.1s
  • Cisco » Ios Xe » Version: 3.16.0s
    cpe:2.3:o:cisco:ios_xe:3.16.0s
  • Cisco » Ios Xe » Version: 3.16.10s
    cpe:2.3:o:cisco:ios_xe:3.16.10s
  • Cisco » Ios Xe » Version: 3.16.1as
    cpe:2.3:o:cisco:ios_xe:3.16.1as
  • Cisco » Ios Xe » Version: 3.16.2as
    cpe:2.3:o:cisco:ios_xe:3.16.2as
  • Cisco » Ios Xe » Version: 3.16.3as
    cpe:2.3:o:cisco:ios_xe:3.16.3as
  • Cisco » Ios Xe » Version: 3.16.4bs
    cpe:2.3:o:cisco:ios_xe:3.16.4bs
  • Cisco » Ios Xe » Version: 3.16.4s
    cpe:2.3:o:cisco:ios_xe:3.16.4s
  • Cisco » Ios Xe » Version: 3.16.5as
    cpe:2.3:o:cisco:ios_xe:3.16.5as
  • Cisco » Ios Xe » Version: 3.16.5s
    cpe:2.3:o:cisco:ios_xe:3.16.5s
  • Cisco » Ios Xe » Version: 3.16.6bs
    cpe:2.3:o:cisco:ios_xe:3.16.6bs
  • Cisco » Ios Xe » Version: 3.16.6s
    cpe:2.3:o:cisco:ios_xe:3.16.6s
  • Cisco » Ios Xe » Version: 3.16.7bs
    cpe:2.3:o:cisco:ios_xe:3.16.7bs
  • Cisco » Ios Xe » Version: 3.16.7s
    cpe:2.3:o:cisco:ios_xe:3.16.7s
  • Cisco » Ios Xe » Version: 3.16.8s
    cpe:2.3:o:cisco:ios_xe:3.16.8s
  • Cisco » Ios Xe » Version: 3.16.9s
    cpe:2.3:o:cisco:ios_xe:3.16.9s
  • Cisco » Ios Xe » Version: 3.17.0s
    cpe:2.3:o:cisco:ios_xe:3.17.0s
  • Cisco » Ios Xe » Version: 3.17.1s
    cpe:2.3:o:cisco:ios_xe:3.17.1s
  • Cisco » Ios Xe » Version: 3.17.2s
    cpe:2.3:o:cisco:ios_xe:3.17.2s
  • Cisco » Ios Xe » Version: 3.17.3s
    cpe:2.3:o:cisco:ios_xe:3.17.3s
  • Cisco » Ios Xe » Version: 3.17.4s
    cpe:2.3:o:cisco:ios_xe:3.17.4s
  • Cisco » Ios Xe » Version: 3.18.0s
    cpe:2.3:o:cisco:ios_xe:3.18.0s
  • Cisco » Ios Xe » Version: 3.18.0sp
    cpe:2.3:o:cisco:ios_xe:3.18.0sp
  • Cisco » Ios Xe » Version: 3.18.1gsp
    cpe:2.3:o:cisco:ios_xe:3.18.1gsp
  • Cisco » Ios Xe » Version: 3.18.1hsp
    cpe:2.3:o:cisco:ios_xe:3.18.1hsp
  • Cisco » Ios Xe » Version: 3.18.1isp
    cpe:2.3:o:cisco:ios_xe:3.18.1isp
  • Cisco » Ios Xe » Version: 3.18.1s
    cpe:2.3:o:cisco:ios_xe:3.18.1s
  • Cisco » Ios Xe » Version: 3.18.1sp
    cpe:2.3:o:cisco:ios_xe:3.18.1sp
  • Cisco » Ios Xe » Version: 3.18.2s
    cpe:2.3:o:cisco:ios_xe:3.18.2s
  • Cisco » Ios Xe » Version: 3.18.2sp
    cpe:2.3:o:cisco:ios_xe:3.18.2sp
  • Cisco » Ios Xe » Version: 3.18.3s
    cpe:2.3:o:cisco:ios_xe:3.18.3s
  • Cisco » Ios Xe » Version: 3.18.3sp
    cpe:2.3:o:cisco:ios_xe:3.18.3sp
  • Cisco » Ios Xe » Version: 3.18.4s
    cpe:2.3:o:cisco:ios_xe:3.18.4s
  • Cisco » Ios Xe » Version: 3.18.4sp
    cpe:2.3:o:cisco:ios_xe:3.18.4sp


Contact Us

Shodan ® - All rights reserved