CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.6 | $0-$5k | 0.00 |
A vulnerability was found in Cisco IOS XE (Router Operating System) (the affected version is unknown). It has been rated as problematic. Affected by this issue is an unknown code of the component Umbrella Connector. The manipulation as part of a DNS Request leads to a 7pk error vulnerability. Using CWE to declare the problem leads to CWE-388. Impacted is availability. CVE summarizes:
A vulnerability in the Umbrella Connector component of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a denial of service condition on an affected device. The vulnerability is due to insufficient error handling when parsing DNS requests. An attacker could exploit this vulnerability by sending a series of malicious DNS requests to an Umbrella Connector client interface of an affected device. A successful exploit could allow the attacker to cause a crash of the iosd process, which triggers a reload of the affected device.
The weakness was published 09/24/2020 as cisco-sa-iosxe-umbrella-dos-t2 as confirmed advisory (Website). The advisory is shared for download at tools.cisco.com. This vulnerability is handled as CVE-2020-3510 since 12/12/2019. The attack may be launched remotely. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 09/25/2020).
Upgrading eliminates this vulnerability.
Similar entries are available at 161904, 161903, 161899 and 161898.
Product
Type
Vendor
Name
License
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.9VulDB Meta Temp Score: 6.8
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.6
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: 7pk errorCWE: CWE-388
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
12/12/2019 🔍09/24/2020 🔍
09/25/2020 🔍
09/25/2020 🔍
Sources
Vendor: cisco.comAdvisory: cisco-sa-iosxe-umbrella-dos-t2
Status: Confirmed
CVE: CVE-2020-3510 (🔍)
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 09/25/2020 13:26Updated: 09/25/2020 13:31
Changes: 09/25/2020 13:26 (41), 09/25/2020 13:31 (12)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.