A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-04-15 08:15
Updated : 2022-04-25 08:28
NVD link : CVE-2022-20678
Mitre link : CVE-2022-20678
JSON object : View
CWE
CWE-755
Improper Handling of Exceptional Conditions
Products Affected
cisco
- catalyst_8500l
- isr_4431
- catalyst_8300-1n1s-6t
- catalyst_8300-2n2s-6t
- isr_1100-4g
- ios_xe
- catalyst_8500-4qc
- catalyst_8300-1n1s-4t2x
- isr_4221
- catalyst_8500
- isr_111x
- isr_1160
- isr_1120
- isr_4331
- isr_1100-6g
- asr_1002-x
- cloud_services_router_1000v
- isr_1109
- isr_1111x
- isr_1131
- catalyst_8300-2n2s-4t2x
- asr_1001-x
- isr_4461
- isr_1101
- catalyst_8000v_edge