Vulnerability Details CVE-2020-3428
A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.9%
CVSS Severity
CVSS v3 Score 7.4
CVSS v2 Score 6.1
Products affected by CVE-2020-3428
-
cpe:2.3:h:cisco:1100_integrated_services_router:-
-
cpe:2.3:h:cisco:1101_integrated_services_router:-
-
cpe:2.3:h:cisco:1109_integrated_services_router:-
-
cpe:2.3:h:cisco:1111x_integrated_services_router:-
-
cpe:2.3:h:cisco:111x_integrated_services_router:-
-
cpe:2.3:h:cisco:1120_integrated_services_router:-
-
cpe:2.3:h:cisco:1160_integrated_services_router:-
-
cpe:2.3:h:cisco:4221_integrated_services_router:-
-
cpe:2.3:h:cisco:4321_integrated_services_router:-
-
cpe:2.3:h:cisco:4331_integrated_services_router:-
-
cpe:2.3:h:cisco:4351_integrated_services_router:-
-
cpe:2.3:h:cisco:4431_integrated_services_router:-
-
cpe:2.3:h:cisco:4451-x_integrated_services_router:-
-
cpe:2.3:h:cisco:4461_integrated_services_router:-
-
cpe:2.3:h:cisco:asr_1001-hx:-
-
cpe:2.3:h:cisco:asr_1001-x:-
-
cpe:2.3:h:cisco:asr_1002-hx:-
-
cpe:2.3:h:cisco:asr_1002-x:-
-
cpe:2.3:h:cisco:asr_1004:-
-
cpe:2.3:h:cisco:asr_1006-x:-
-
cpe:2.3:h:cisco:asr_1006:-
-
cpe:2.3:h:cisco:asr_1009-x:-
-
cpe:2.3:h:cisco:asr_1013:-
-
cpe:2.3:h:cisco:catalyst_9800-40:-
-
cpe:2.3:h:cisco:catalyst_9800-80:-
-
cpe:2.3:h:cisco:catalyst_9800-cl:-
-
cpe:2.3:h:cisco:catalyst_9800-l-c:-
-
cpe:2.3:h:cisco:catalyst_9800-l-f:-
-
cpe:2.3:h:cisco:catalyst_9800-l:-
-
cpe:2.3:h:cisco:catalyst_c9200-24p:-
-
cpe:2.3:h:cisco:catalyst_c9200-24t:-
-
cpe:2.3:h:cisco:catalyst_c9200-48p:-
-
cpe:2.3:h:cisco:catalyst_c9200-48t:-
-
cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-
-
cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-
-
cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-
-
cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-
-
cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-
-
cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-
-
cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-
-
cpe:2.3:h:cisco:catalyst_c9300-24p:-
-
cpe:2.3:h:cisco:catalyst_c9300-24s:-
-
cpe:2.3:h:cisco:catalyst_c9300-24t:-
-
cpe:2.3:h:cisco:catalyst_c9300-24u:-
-
cpe:2.3:h:cisco:catalyst_c9300-24ux:-
-
cpe:2.3:h:cisco:catalyst_c9300-48p:-
-
cpe:2.3:h:cisco:catalyst_c9300-48s:-
-
cpe:2.3:h:cisco:catalyst_c9300-48t:-
-
cpe:2.3:h:cisco:catalyst_c9300-48u:-
-
cpe:2.3:h:cisco:catalyst_c9300-48un:-
-
cpe:2.3:h:cisco:catalyst_c9300-48uxm:-
-
cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-
-
cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-
-
cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-
-
cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-
-
cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-
-
cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-
-
cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-
-
cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-
-
cpe:2.3:h:cisco:catalyst_c9404r:-
-
cpe:2.3:h:cisco:catalyst_c9407r:-
-
cpe:2.3:h:cisco:catalyst_c9410r:-
-
cpe:2.3:h:cisco:catalyst_c9500-12q:-
-
cpe:2.3:h:cisco:catalyst_c9500-16x:-
-
cpe:2.3:h:cisco:catalyst_c9500-24q:-
-
cpe:2.3:h:cisco:catalyst_c9500-24y4c:-
-
cpe:2.3:h:cisco:catalyst_c9500-32c:-
-
cpe:2.3:h:cisco:catalyst_c9500-32qc:-
-
cpe:2.3:h:cisco:catalyst_c9500-40x:-
-
cpe:2.3:h:cisco:catalyst_c9500-48y4c:-
-
cpe:2.3:h:cisco:catalyst_c9600_switch:-
-
cpe:2.3:h:cisco:cloud_services_router_1000v:-
-
cpe:2.3:h:cisco:integrated_services_virtual_router:-
-