A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr920-ABjcLmef | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-06-03T00:00:00
Updated: 2020-06-03T17:55:26
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3232
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-03T18:15:21.183
Modified: 2021-10-19T20:20:10.423
Link: CVE-2020-3232
JSON object: View
Redhat Information
No data.
CWE