{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:13:43.705","vulnerabilities":[{"cve":{"id":"CVE-2023-20226","sourceIdentifier":"psirt@cisco.com","published":"2023-09-27T18:15:11.307","lastModified":"2024-11-21T07:40:56.363","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la Application Quality of Experience (AppQoE) y en el Unified Threat Defense (UTD) en el software Cisco IOS XE podría permitir que un atacante remoto no autenticado provoque que un dispositivo afectado se recargue inesperadamente, lo que resultaría en una condición de denegación de servicio (DoS). Esta vulnerabilidad se debe al mal manejo de un flujo de paquetes manipulado a través de la aplicación AppQoE o UTD. Un atacante podría aprovechar esta vulnerabilidad enviando un flujo de paquetes manipulado a través de un dispositivo afectado. Un exploit exitoso podría permitir que el atacante provoque que el dispositivo se recargue, lo que resultaría en una condición DoS."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-456"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*","matchCriteriaId":"38B87B17-C653-40AC-8AE4-066BB1123C88"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*","matchCriteriaId":"9012A66E-82C4-4ACF-A4BB-37EC54B87B50"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*","matchCriteriaId":"849C6FF1-F7C0-4021-BCA2-A791C87E4F37"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*","matchCriteriaId":"7592C7E3-3735-425F-A276-9EE03224CD5E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*","matchCriteriaId":"1103BE75-EB64-4A9A-801E-EDE6A1F861F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*","matchCriteriaId":"5B0C2129-8149-4362-827C-A5494C9D398B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*","matchCriteriaId":"7452C7E9-6241-42C5-9A7F-13C0BD38A2B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*","matchCriteriaId":"D197445E-EC12-429C-BDD4-F63FA5C1B3E3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*","matchCriteriaId":"BD27DF50-9E81-4EC5-BA73-513F1DFB972C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*","matchCriteriaId":"42FAEC29-D754-49D6-85F1-F5DDFAF6E80F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*","matchCriteriaId":"CCE76032-948F-444F-BA5D-72A34D1CD382"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*","matchCriteriaId":"CF365FC4-46E3-4564-9F25-1C2FBE70057B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"0F77CD6A-83DA-4F31-A128-AD6DAECD623B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"62564BB8-1282-4597-A645-056298BE7CCB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"2B68B363-3C57-4E95-8B13-0F9B59D551F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6C8AED7C-DDA3-4C29-BB95-6518C02C551A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"05C90C43-2D7D-43F8-AD7F-421878909AE2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"445597DA-7EEC-470D-9A71-BC43A9F7DE5E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"86049773-C88D-4A26-A0D3-D40F3C312AEC"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"9421DBEF-AE42-4234-B49F-FCC34B804D7F"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"6AB4B7C2-4D45-4267-BCBB-57D36C6104A3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"3B8A4630-8B21-4994-8EF5-E105593A64E5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"F799DC02-EB06-458C-8545-A174475FE7A2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5419CB9F-241F-4431-914F-2659BE27BEA5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"B89FBA68-A8ED-4C5A-916E-A68468F59730"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"DC278B77-AD63-42AD-B9E8-EE4DE97E27E9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"5720462A-BE6B-4E84-A1A1-01E80BBA86AD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*","matchCriteriaId":"CCF17101-9EF9-47BB-B966-0FA9B71AEEFA"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*","matchCriteriaId":"E2F0C218-B0FF-4BEC-B76F-1F4BAA6D0960"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:c8500l-8s4x:-:*:*:*:*:*:*:*","matchCriteriaId":"FB2038BF-DC77-4326-B80C-FC3384FED25E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*","matchCriteriaId":"5E7E8914-7B25-4097-8B22-6928C1F03D5A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*","matchCriteriaId":"B207857B-C483-47DF-9FC7-6A05B866BF60"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*","matchCriteriaId":"CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*","matchCriteriaId":"BDB16CCE-1E89-4707-86C1-97F2FB5B62B9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_ir8340:-:*:*:*:*:*:*:*","matchCriteriaId":"4E6CCE9B-1F88-42AE-AB12-6345C44D597E"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}