A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. The vulnerability is due to insufficient verification of authenticity of received Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by tampering with ESP cleartext values as a man-in-the-middle.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-03 11:15
Updated : 2020-06-10 16:45
NVD link : CVE-2020-3220
Mitre link : CVE-2020-3220
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
cisco
- ios_xe