{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T03:07:44.773","vulnerabilities":[{"cve":{"id":"CVE-2020-3422","sourceIdentifier":"psirt@cisco.com","published":"2020-09-24T18:15:19.040","lastModified":"2024-11-21T05:31:01.960","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the IP Service Level Agreement (SLA) responder feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the IP SLA responder to reuse an existing port, resulting in a denial of service (DoS) condition. The vulnerability exists because the IP SLA responder could consume a port that could be used by another feature. An attacker could exploit this vulnerability by sending specific IP SLA control packets to the IP SLA responder on an affected device. The control packets must include the port number that could be used by another configured feature. A successful exploit could allow the attacker to cause an in-use port to be consumed by the IP SLA responder, impacting the feature that was using the port and resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad de respuesta de Service Level Agreement (SLA) de IP de Cisco IOS XE Software, podría permitir a un atacante remoto no autenticado causar que el que responde el SLA de IP reutilice un puerto existente, resultando en una condición de denegación de servicio (DoS).&#xa0;La vulnerabilidad se presenta porque el que responde el SLA de IP podría consumir un puerto que podría ser usado por otra funcionalidad.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de paquetes de control de SLA de IP específicos hacia el que responde de SLA de IP en un dispositivo afectado.&#xa0;Los paquetes de control deben incluir el número de puerto que podría ser usado por otra funcionalidad configurada.&#xa0;Una explotación con éxito podría permitir al atacante causar que un puerto en uso sea consumido por el que responde el SLA de IP, impactando la funcionalidad que estaba usando el puerto y resultando en una condición DoS."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-371"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*","matchCriteriaId":"E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5EB8A757-7888-4AC2-BE44-B89DB83C6C77"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"B80890A8-E3D3-462C-B125-9E9BC6525B02"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"0547E196-5991-4C33-823A-342542E9DFD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"802CBFC1-8A2F-4BF7-A1D3-00622C33BE16"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"D916389F-54DB-44CB-91DD-7CE3C7059350"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6C8AED7C-DDA3-4C29-BB95-6518C02C551A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5419CB9F-241F-4431-914F-2659BE27BEA5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5720462A-BE6B-4E84-A1A1-01E80BBA86AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E8B60888-6E2B-494E-AC65-83337661EE7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*","matchCriteriaId":"7594E307-AC80-41EC-AE94-07E664A7D701"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*","matchCriteriaId":"09C913FF-63D5-43FB-8B39-598EF436BA5A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*","matchCriteriaId":"CD2794BD-C8CE-46EF-9857-1723FCF04E46"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*","matchCriteriaId":"444F688F-79D0-4F22-B530-7BD520080B8F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*","matchCriteriaId":"55DD2272-10C2-43B9-9F13-6DC41DBE179B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*","matchCriteriaId":"7428E0A8-1641-47FB-9CA9-34311DEF660D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*","matchCriteriaId":"DE7401B7-094C-46EB-9869-2F0372E8B26B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*","matchCriteriaId":"8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*","matchCriteriaId":"854D9594-FE84-4E7B-BA21-A3287F2DC302"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*","matchCriteriaId":"7814FA61-CAF1-46DE-9D84-CEBE6480EA03"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*","matchCriteriaId":"005F5347-A5E6-4954-ACAB-E4DF29119724"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*","matchCriteriaId":"FC4A5C56-0D08-4423-AEBD-33EDF172FCF9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*","matchCriteriaId":"0972076B-5C87-44B3-90EC-4C200B89318A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*","matchCriteriaId":"737F22AB-C5A9-4A18-BA3D-38A222491397"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*","matchCriteriaId":"176ACF88-6112-4179-8492-50C50577B300"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*","matchCriteriaId":"C19A801D-02D7-40B0-88E8-FE7BA8630E60"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*","matchCriteriaId":"A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*","matchCriteriaId":"BF8B0B49-2C99-410B-B011-5B821C5992FB"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}