Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24782 | A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device. |
Wed, 13 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T18:00:40.783Z
Reserved: 2019-12-12T00:00:00.000Z
Link: CVE-2020-3511
Updated: 2024-08-04T07:37:54.701Z
Status : Modified
Published: 2020-09-24T18:15:21.230
Modified: 2024-11-21T05:31:13.380
Link: CVE-2020-3511
No data.
OpenCVE Enrichment
No data.
EUVD