Lucene search

K
cve[email protected]CVE-2020-7122
HistorySep 23, 2020 - 1:15 p.m.

CVE-2020-7122

2020-09-2313:15:16
CWE-787
web.nvd.nist.gov
28
aruba
cx switches
memory corruption
vulnerabilities
firmware
nvd
cve-2020-7122

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

41.5%

Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the CDP (Cisco Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.1000.

Affected configurations

NVD
Node
arubanetworkscx_6200f_firmwareRange10.04.1000
AND
arubanetworkscx_6200fMatch-
Node
arubanetworkscx_6300_firmwareRange10.04.1000
AND
arubanetworkscx_6300Match-
Node
arubanetworkscx_6400_firmwareRange10.04.1000
AND
arubanetworkscx_6400Match-
Node
arubanetworkscx_8320_firmwareRange10.04.1000
AND
arubanetworkscx_8320Match-
Node
arubanetworkscx_8325_firmwareRange10.04.1000
AND
arubanetworkscx_8325Match-
Node
arubanetworkscx_8400_firmwareRange10.04.1000
AND
arubanetworkscx_8400Match-

CNA Affected

[
  {
    "product": "Aruba CX Switch Series 6200F, 6300, 6400, 8320, 8325, and 8400",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Firmware 10.04.1000 and below"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

41.5%

Related for CVE-2020-7122