Language:
http://www.nessus.org/u?f82c71be
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr51353
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr52613
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr76792
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr77049
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr77764
Severity: High
ID: 145692
File Name: cisco-sa-capwap-dos-TPdNTdyq.nasl
Version: 1.4
Type: combined
Family: CISCO
Published: 1/29/2021
Updated: 1/25/2024
Supported Sensors: Nessus
Risk Factor: Medium
Score: 4.4
Risk Factor: Medium
Base Score: 6.1
Temporal Score: 4.5
Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C
CVSS Score Source: CVE-2020-3497
Risk Factor: High
Base Score: 7.4
Temporal Score: 6.4
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:cisco:ios_xe
Required KB Items: Host/Cisco/IOS-XE/Version, Host/Cisco/IOS-XE/Model, Host/Cisco/device_model
Exploit Ease: No known exploits are available
Patch Publication Date: 9/24/2020
Vulnerability Publication Date: 9/24/2020
CVE: CVE-2020-3486, CVE-2020-3487, CVE-2020-3488, CVE-2020-3489, CVE-2020-3493, CVE-2020-3494, CVE-2020-3497
CWE: 20
CISCO-SA: cisco-sa-capwap-dos-TPdNTdyq
IAVA: 2020-A-0439-S
CISCO-BUG-ID: CSCvr51353, CSCvr52613, CSCvr76792, CSCvr77049, CSCvr77764, CSCvr84445, CSCvr91229