{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T10:45:45.310","vulnerabilities":[{"cve":{"id":"CVE-2020-3203","sourceIdentifier":"psirt@cisco.com","published":"2020-06-03T18:15:17.853","lastModified":"2024-11-21T05:30:32.917","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the locally significant certificate (LSC) provisioning feature of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak that could lead to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain public key infrastructure (PKI) packets. An attacker could exploit this vulnerability by sending crafted Secure Sockets Layer (SSL) packets to an affected device. A successful exploit could cause an affected device to continuously consume memory, which could result in a memory allocation failure that leads to a crash and causes a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad locally significant certificate (LSC) de Cisco Catalyst 9800 Series Wireless Controllers que ejecuta Cisco IOS XE Software, podría permitir a un atacante remoto no autenticado causar una pérdida de memoria que podría conllevar a una condición de denegación de servicio (DoS) . La vulnerabilidad es debido al procesamiento incorrecto de determinados paquetes de infraestructura de clave pública (PKI). Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes Secure Sockets Layer (SSL) diseñados hacia un dispositivo afectado. Una explotación con éxito podría causar a un dispositivo afectado consumir continuamente la memoria, lo que podría resultar en un fallo de asignación de memoria que conlleva a un bloqueo y causar una condición DoS."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*","matchCriteriaId":"0ED5527C-A638-4E20-9928-099E32E17743"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*","matchCriteriaId":"1A685A9A-235D-4D74-9D6C-AC49E75709CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*","matchCriteriaId":"43052998-0A27-4E83-A884-A94701A3F4CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*","matchCriteriaId":"89526731-B712-43D3-B451-D7FC503D2D65"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*","matchCriteriaId":"302933FE-4B6A-48A3-97F0-4B943251B717"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*","matchCriteriaId":"296636F1-9242-429B-8472-90352C056106"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*","matchCriteriaId":"77993343-0394-413F-ABF9-C1215E9AD800"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*","matchCriteriaId":"283971DD-DD58-4A76-AC2A-F316534ED416"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*","matchCriteriaId":"A8F324A5-4830-482E-A684-AB3B6594CEAE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*","matchCriteriaId":"E8120196-8648-49D0-8262-CD4C9C90C37A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*","matchCriteriaId":"33E7CCE2-C685-4019-9B55-B3BECB3E5F76"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*","matchCriteriaId":"0699DD6E-BA74-4814-93AB-300329C9D032"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*","matchCriteriaId":"C2E2D781-2684-45F1-AC52-636572A0DCA8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*","matchCriteriaId":"479FB47B-AF2E-4FCB-8DE0-400BF325666C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*","matchCriteriaId":"DF2B4C78-5C31-4F3D-9639-305E15576E79"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*","matchCriteriaId":"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*","matchCriteriaId":"77E8AF15-AB46-4EAB-8872-8C55E8601599"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*","matchCriteriaId":"957318BE-55D4-4585-AA52-C813301D01C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*","matchCriteriaId":"8F11B703-8A0F-47ED-AA70-951FF78B94A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*","matchCriteriaId":"FE7B2557-821D-4E05-B5C3-67192573D97D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*","matchCriteriaId":"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*","matchCriteriaId":"187F699A-AF2F-42B0-B855-27413140C384"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*","matchCriteriaId":"7E0B905E-4D92-4FD6-B2FF-41FF1F59A948"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*","matchCriteriaId":"62EDEC28-661E-42EF-88F0-F62D0220D2E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*","matchCriteriaId":"623BF701-ADC9-4F24-93C5-043A6A7FEF5F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*","matchCriteriaId":"0FBD681F-7969-42BE-A47E-7C287755DCB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*","matchCriteriaId":"98255E6F-3056-487D-9157-403836EFB9D3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*","matchCriteriaId":"57D4F634-03D5-4D9F-901C-7E9CE45F2F38"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*","matchCriteriaId":"4463A1D1-E169-4F0B-91B2-FA126BB444CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*","matchCriteriaId":"D97F69C3-CAA6-491C-A0B6-6DC12B5AB472"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDD58C58-1B0C-4A71-8C02-F555CEF9C253"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*","matchCriteriaId":"5C9C585C-A6EC-4385-B915-046C110BF95F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*","matchCriteriaId":"5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*","matchCriteriaId":"47DBE4ED-1CD8-4134-9B33-17A91F44F17B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*","matchCriteriaId":"DB6BD18B-B9BD-452F-986E-16A6668E46B6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*","matchCriteriaId":"D136D2BC-FFB5-4912-A3B1-BD96148CB9A5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*","matchCriteriaId":"A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*","matchCriteriaId":"ADED0D82-2A4D-4235-BFAC-5EE2D862B652"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*","matchCriteriaId":"763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*","matchCriteriaId":"0A443E93-6C4B-4F86-BA7C-7C2A929E795A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*","matchCriteriaId":"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*","matchCriteriaId":"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*","matchCriteriaId":"314C7763-A64D-4023-9F3F-9A821AE4151F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*","matchCriteriaId":"5820D71D-FC93-45AA-BC58-A26A1A39C936"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*","matchCriteriaId":"FC1C85DD-69CC-4AA8-B219-651D57FC3506"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*","matchCriteriaId":"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*","matchCriteriaId":"C98DED36-D4B5-48D6-964E-EEEE97936700"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*","matchCriteriaId":"CD98C9E8-3EA6-4160-970D-37C389576516"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*","matchCriteriaId":"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*","matchCriteriaId":"9027A528-2588-4C06-810B-5BB313FE4323"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*","matchCriteriaId":"E5019B59-508E-40B0-9C92-2C26F58E2FBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*","matchCriteriaId":"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*","matchCriteriaId":"7F02EE9D-45B1-43D6-B05D-6FF19472216B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*","matchCriteriaId":"838D6C2D-C131-4A9C-AAE5-5BF38E637E4B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*","matchCriteriaId":"1B9ED0E5-CB20-4106-9CF2-8EB587B33543"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*","matchCriteriaId":"2B0E620C-8E09-4F7C-A326-26013173B993"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*","matchCriteriaId":"FF93F1C8-669F-4ECB-8D81-ECDA7B550175"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*","matchCriteriaId":"2E0BA345-B7D7-4975-9199-4DC7875BBFD0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*","matchCriteriaId":"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*","matchCriteriaId":"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}