Cisco Virtualized Packet Core-Single Instance (VPC-SI)

CPE Details

Cisco Virtualized Packet Core-Single Instance (VPC-SI)
-
2020-08-19
12h23 +00:00
2020-08-19
12h23 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cisco:virtualized_packet_core-single_instance:-:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

virtualized_packet_core-single_instance

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-1353 2021-01-20 20h00 +00:00 A vulnerability in the IPv4 protocol handling of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak that occurs during packet processing. An attacker could exploit this vulnerability by sending a series of crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to exhaust the available memory and cause an unexpected restart of the npusim process, leading to a DoS condition on the affected device.
8.6
High
CVE-2020-3500 2020-08-17 18h00 +00:00 A vulnerability in the IPv6 implementation of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to an affected device with the goal of reaching the vulnerable section of the input buffer. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
8.6
High