{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:15:13.822","vulnerabilities":[{"cve":{"id":"CVE-2020-3414","sourceIdentifier":"psirt@cisco.com","published":"2020-09-24T18:15:18.463","lastModified":"2024-11-21T05:30:59.130","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the packet processing of Cisco IOS XE Software for Cisco 4461 Integrated Services Routers could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect processing of IPv4 or IPv6 traffic to or through an affected device. An attacker could exploit this vulnerability by sending IP traffic to or through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el procesamiento de paquetes de Cisco IOS XE Software para Cisco 4461 Integrated Services Routers, podría permitir a un atacante remoto no autenticado causar la recarga de un dispositivo afectado, resultando en una condición de denegación de servicio (DoS).&#xa0;La vulnerabilidad es debido al procesamiento incorrecto del tráfico IPv4 o IPv6 hacia o a través de un dispositivo afectado.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico IP hacia o a través de un dispositivo afectado.&#xa0;Una explotación con éxito podría permitir al atacante causar que el dispositivo se recargue, resultando una condición de DoS."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-19"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*","matchCriteriaId":"F29CEE37-4044-4A3C-9685-C9C021FD346A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.10.4:*:*:*:*:*:*:*","matchCriteriaId":"717CCF6B-BF35-45A9-85D1-4E54783B9412"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*","matchCriteriaId":"B53E377A-0296-4D7A-B97C-576B0026543D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*","matchCriteriaId":"D5750264-2990-4942-85F4-DB9746C5CA2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E306B09C-CB48-4067-B60C-5F738555EEAC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E8B60888-6E2B-494E-AC65-83337661EE7D"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}