ID

VAR-202008-0830


CVE

CVE-2020-3496


TITLE

Cisco Small Business Smart and Managed Switch Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-010444

DESCRIPTION

A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected

Trust: 2.16

sources: NVD: CVE-2020-3496 // JVNDB: JVNDB-2020-010444 // CNVD: CNVD-2020-48989

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-48989

AFFECTED PRODUCTS

vendor:ciscomodel:sg200-26fpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf350-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-10pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-26pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-28mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500-52mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-26hpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-50pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf200-24fpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-10mppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350-10pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350x-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf500-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf350-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-48mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf302-08mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350xg-2f10scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sx550x-24fscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sx550x-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf550x-48mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-28pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-50pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-10mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-10sfpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf500-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-50hpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf500-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350x-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf200-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf550x-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250x-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500x-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf250-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350x-24mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf200-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf350-48mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-24ppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500-28scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500-28pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-52scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500-52pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-48ppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-52mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500x-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-50scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-18scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-10fpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg355-10pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sx550x-12fscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250x-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-24mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350-10mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-50scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf200-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350xg-24tscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-08scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500-52scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350xg-24fscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-18scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-08scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-10pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250x-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-50fpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf550x-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf302-08scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-10ppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350-28scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-26scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sx550x-16ftscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-26pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf550x-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf500-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf302-08mppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-08hpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sx550x-24ftscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500x-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-52pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350-28mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350x-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf550x-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf200-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf250-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350-10scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-28ppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350xg-48tscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-24mppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350x-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500-28mppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-28scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-26scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250x-48pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg250-08scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-08pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-20scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg300-10scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500x-48scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf302-08ppscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg500xg-8f8tscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf250-48hpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf302-08pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf550x-24mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg550x-24pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350x-48mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sx550x-52scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf250-24scope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg350-28pscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sf300-24mpscope:lteversion:2.5.5.47

Trust: 1.0

vendor:ciscomodel:sg200-08scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-08pscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-10fpscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-18scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-26scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-26fpscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-26pscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-50scope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-50fpscope: - version: -

Trust: 0.8

vendor:ciscomodel:sg200-50pscope: - version: -

Trust: 0.8

vendor:ciscomodel:small business smart and managed switchesscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-48989 // JVNDB: JVNDB-2020-010444 // NVD: CVE-2020-3496

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3496
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3496
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-010444
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-48989
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202008-979
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-3496
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-010444
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-48989
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-3496
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3496
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-010444
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-48989 // JVNDB: JVNDB-2020-010444 // CNNVD: CNNVD-202008-979 // NVD: CVE-2020-3496 // NVD: CVE-2020-3496

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2020-010444 // NVD: CVE-2020-3496

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202008-979

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202008-979

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-010444

PATCH

title:cisco-sa-sbss-ipv6-dos-tsgqbffWurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW

Trust: 0.8

title:Patch for Cisco Small Business Smart and Managed Switches Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/232054

Trust: 0.6

sources: CNVD: CNVD-2020-48989 // JVNDB: JVNDB-2020-010444

EXTERNAL IDS

db:NVDid:CVE-2020-3496

Trust: 3.0

db:JVNDBid:JVNDB-2020-010444

Trust: 0.8

db:CNVDid:CNVD-2020-48989

Trust: 0.6

db:AUSCERTid:ESB-2020.2859

Trust: 0.6

db:NSFOCUSid:48759

Trust: 0.6

db:CNNVDid:CNNVD-202008-979

Trust: 0.6

sources: CNVD: CNVD-2020-48989 // JVNDB: JVNDB-2020-010444 // CNNVD: CNNVD-202008-979 // NVD: CVE-2020-3496

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sbss-ipv6-dos-tsgqbffw

Trust: 2.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-3496

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3496

Trust: 0.8

url:http://www.nsfocus.net/vulndb/48759

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2859/

Trust: 0.6

sources: CNVD: CNVD-2020-48989 // JVNDB: JVNDB-2020-010444 // CNNVD: CNNVD-202008-979 // NVD: CVE-2020-3496

SOURCES

db:CNVDid:CNVD-2020-48989
db:JVNDBid:JVNDB-2020-010444
db:CNNVDid:CNNVD-202008-979
db:NVDid:CVE-2020-3496

LAST UPDATE DATE

2024-11-23T22:25:23.409000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-48989date:2020-08-28T00:00:00
db:JVNDBid:JVNDB-2020-010444date:2021-01-18T07:48:14
db:CNNVDid:CNNVD-202008-979date:2021-01-05T00:00:00
db:NVDid:CVE-2020-3496date:2024-11-21T05:31:11.363

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-48989date:2020-08-28T00:00:00
db:JVNDBid:JVNDB-2020-010444date:2021-01-18T07:48:14
db:CNNVDid:CNNVD-202008-979date:2020-08-19T00:00:00
db:NVDid:CVE-2020-3496date:2020-08-26T17:15:14.210