{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-20226","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2022-10-27T18:47:50.368Z","datePublished":"2023-09-27T17:21:10.910Z","dateUpdated":"2024-08-02T09:05:35.907Z"},"containers":{"cna":{"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-01-25T16:58:24.979Z"},"descriptions":[{"lang":"en","value":"A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."}],"affected":[{"vendor":"Cisco","product":"Cisco IOS XE Software","versions":[{"version":"17.7.1","status":"affected"},{"version":"17.7.1a","status":"affected"},{"version":"17.7.2","status":"affected"},{"version":"17.10.1","status":"affected"},{"version":"17.10.1a","status":"affected"},{"version":"17.8.1","status":"affected"},{"version":"17.8.1a","status":"affected"},{"version":"17.9.1","status":"affected"},{"version":"17.9.2","status":"affected"},{"version":"17.9.1a","status":"affected"},{"version":"17.9.2a","status":"affected"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Missing Initialization of a Variable","type":"cwe","cweId":"CWE-456"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y","name":"cisco-sa-appqoe-utd-dos-p8O57p5y"}],"metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-appqoe-utd-dos-p8O57p5y","discovery":"INTERNAL","defects":["CSCwd67335"]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T09:05:35.907Z"},"title":"CVE Program Container","references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y","name":"cisco-sa-appqoe-utd-dos-p8O57p5y","tags":["x_transferred"]}]}]}}