A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
History

Sat, 02 Nov 2024 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2022-10-10T20:43:15.373933Z

Updated: 2024-11-01T18:49:31.851Z

Reserved: 2021-11-02T00:00:00

Link: CVE-2022-20870

cve-icon Vulnrichment

Updated: 2024-08-03T02:24:50.248Z

cve-icon NVD

Status : Modified

Published: 2022-10-10T21:15:10.273

Modified: 2024-11-21T06:43:43.347

Link: CVE-2022-20870

cve-icon Redhat

No data.