{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T09:09:05.725","vulnerabilities":[{"cve":{"id":"CVE-2020-3574","sourceIdentifier":"psirt@cisco.com","published":"2020-11-06T19:15:14.847","lastModified":"2024-11-21T05:31:20.600","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad TCP packet processing de Cisco IP Phones, podría permitir a un atacante remoto no autenticado causar que el teléfono dejara de responder a las llamadas entrantes, abandonara las llamadas conectadas o se recargara inesperadamente.&#xa0;La vulnerabilidad es debido a una limitación insuficiente de la tasa de paquetes de entrada TCP.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío una tasa alta y sostenida de tráfico TCP diseñado hacia el dispositivo apuntado.&#xa0;Una explotación con éxito podría permitir al atacante afectar las operaciones del teléfono o hacer que el teléfono se recargue, dando lugar a una condición de denegación de servicio (DoS)"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-371"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_dect_210_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.1","matchCriteriaId":"CC3C8D7D-A5B0-4771-9665-D0258312BB8D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_dect_210:-:*:*:*:*:*:*:*","matchCriteriaId":"9B6E163D-94B8-453B-8189-804A7C1DE8DA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_dect_6825_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.1","matchCriteriaId":"3B835D24-DA8B-4E9F-8731-8E53438CB912"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_dect_6825:-:*:*:*:*:*:*:*","matchCriteriaId":"4713CBC4-DC13-4D0E-83E6-34F4AAF07A58"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.3.2","matchCriteriaId":"4BEAB12F-7C8B-4960-9161-89714A4DEF42"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*","matchCriteriaId":"D0CC3127-3152-4906-9FE0-BC6F21DCADAA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.3.2","matchCriteriaId":"366D15A9-2EBE-4CB9-A2DF-D5D575598744"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*","matchCriteriaId":"7944CC9C-AE08-4F30-AF65-134DADBD0FA1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.3.2","matchCriteriaId":"F7907FF6-F949-45FA-910C-FF111140594B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*","matchCriteriaId":"8AF6DC5E-F582-445E-BF05-2D55A0954663"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.3.2","matchCriteriaId":"4709CCDB-04A6-4E63-A4E9-02904E44FA65"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*","matchCriteriaId":"090EE553-01D5-45F0-87A4-E1167F46EB77"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:9.3\\(4\\):servicerelease3:*:*:*:*:*:*","matchCriteriaId":"5773D5CD-4D6E-468C-A07A-C8A707B11FF9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*","matchCriteriaId":"660475FD-8475-4968-9ED2-D83461B9A5D4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:webex_room_phone_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.0","matchCriteriaId":"8831D2CE-55CD-4D5D-A9FB-3D9AC04DE5D1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:webex_room_phone:-:*:*:*:*:*:*:*","matchCriteriaId":"060033D2-5332-4C89-813A-3780E1619DFD"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv","source":"psirt@cisco.com","tags":["Patch","Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phone-flood-dos-YnU9EXOv","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}