{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:48:53.842","vulnerabilities":[{"cve":{"id":"CVE-2022-20678","sourceIdentifier":"psirt@cisco.com","published":"2022-04-15T15:15:12.467","lastModified":"2024-11-21T06:43:18.097","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload."},{"lang":"es","value":"Una vulnerabilidad en la función AppNav-XE del software Cisco IOS XE podría permitir a un atacante remoto no autenticado causar la recarga de un dispositivo afectado, resultando en una condición de denegación de servicio (DoS). Esta vulnerabilidad es debido al manejo incorrecto de determinados segmentos TCP. Un atacante podría explotar esta vulnerabilidad mediante el envío de un flujo de tráfico TCP diseñado a gran velocidad mediante una interfaz de un dispositivo afectado. Esa interfaz tendría que tener habilitada la interceptación de AppNav. Una explotación con éxito podría permitir al atacante causar una recarga del dispositivo"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-413"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-755"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*","matchCriteriaId":"961F8312-31B9-44E7-8858-EF8E2134F447"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*","matchCriteriaId":"7F02EE9D-45B1-43D6-B05D-6FF19472216B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*","matchCriteriaId":"8FCB9440-F470-45D1-AAFA-01FB5D76B600"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*","matchCriteriaId":"C5DD2403-113B-4100-8BD4-90E1927E6648"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*","matchCriteriaId":"CF365FC4-46E3-4564-9F25-1C2FBE70057B"},{"vulnerable":false,"criteria":"cpe:2.3:a:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*","matchCriteriaId":"237136F5-5A1B-4033-8B7C-CDAD66AF25DF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"0F77CD6A-83DA-4F31-A128-AD6DAECD623B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"2B68B363-3C57-4E95-8B13-0F9B59D551F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5EB8A757-7888-4AC2-BE44-B89DB83C6C77"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"B80890A8-E3D3-462C-B125-9E9BC6525B02"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"0547E196-5991-4C33-823A-342542E9DFD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"802CBFC1-8A2F-4BF7-A1D3-00622C33BE16"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"F3F374DC-B9F7-4515-A064-01BB436CA984"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"D916389F-54DB-44CB-91DD-7CE3C7059350"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6C8AED7C-DDA3-4C29-BB95-6518C02C551A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5419CB9F-241F-4431-914F-2659BE27BEA5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5720462A-BE6B-4E84-A1A1-01E80BBA86AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"E8B60888-6E2B-494E-AC65-83337661EE7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*","matchCriteriaId":"09C913FF-63D5-43FB-8B39-598EF436BA5A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*","matchCriteriaId":"444F688F-79D0-4F22-B530-7BD520080B8F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*","matchCriteriaId":"5E7E8914-7B25-4097-8B22-6928C1F03D5A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*","matchCriteriaId":"B207857B-C483-47DF-9FC7-6A05B866BF60"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*","matchCriteriaId":"CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*","matchCriteriaId":"BDB16CCE-1E89-4707-86C1-97F2FB5B62B9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*","matchCriteriaId":"7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*","matchCriteriaId":"A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*","matchCriteriaId":"04AB61E9-0148-495E-BD21-64D52DE60A6C"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appnav-xe-dos-j5MXTR4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}