Skip to content

A vulnerability in the Open Shortest Path First (OSPF)...

Moderate severity Unreviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Aug 25, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A vulnerability in the Open Shortest Path First (OSPF) implementation in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. The vulnerability is due to incorrect processing of certain OSPF packets. An attacker could exploit this vulnerability by sending a series of crafted OSPF packets to be processed by an affected device. A successful exploit could allow the attacker to continuously consume memory on an affected device and eventually cause it to reload, resulting in a denial of service (DoS) condition.

References

Published by the National Vulnerability Database May 6, 2020
Published to the GitHub Advisory Database May 24, 2022
Last updated Aug 25, 2023

Severity

Moderate

EPSS score

0.159%
(53rd percentile)

CVE ID

CVE-2020-3195

GHSA ID

GHSA-868c-7v9p-gmxp

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.