๐Ÿ” CVE Alert

CVE-2022-20837

HIGH 8.6

Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability

CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the DNS application layer gateway (ALG) functionality that is used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a logic error that occurs when an affected device inspects certain TCP DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through the affected device that is performing NAT for DNS packets. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on the affected device. Note: This vulnerability can be exploited only by sending IPv4 TCP packets through an affected device. This vulnerability cannot be exploited by sending IPv6 traffic.

CWE CWE-754
Vendor cisco
Product cisco ios xe software
Ecosystems
Industries
NetworkingTelecommunications
Published Oct 10, 2022
Last Updated Nov 1, 2024
Stay Ahead of the Next One

Get instant alerts for cisco cisco ios xe software

Be the first to know when new high vulnerabilities affecting cisco cisco ios xe software are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Cisco / Cisco IOS XE Software
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tools.cisco.com: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-KU9Z8kFX