Vulnerability Details : CVE-2022-20697
A vulnerability in the web services interface of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper resource management in the HTTP server code. An attacker could exploit this vulnerability by sending a large number of HTTP requests to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Vulnerability category: Denial of service
Products affected by CVE-2022-20697
- cpe:2.3:o:cisco:ios:15.1\(3\)svr1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svr2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svr3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svs:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svs1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(7\)e3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(7\)e3k:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.9\(3\)m2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.9\(3\)m2a:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.9\(3\)m3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svt1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svt2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svu1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svu10:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(7\)e3a:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.9\(3\)m3a:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.9\(3\)m3b:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(7\)e4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(8\)e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2\(234k\)e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.3\(3\)jk100:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.9\(3\)m4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svt3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svu2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1\(3\)svv1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.3\(3\)jpj8:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-20697
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-20697
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST | |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
3.9
|
4.0
|
Cisco Systems, Inc. | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
3.9
|
4.0
|
NIST |
CWE ids for CVE-2022-20697
-
The code does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways.Assigned by: ykramarz@cisco.com (Secondary)
-
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-20697
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-dos-svOdkdBS
Cisco IOS and IOS XE Software Web Services Denial of Service VulnerabilityVendor Advisory
Jump to