CVE-2020-3231 (CNNVD-202006-388)
中文标题:
Cisco Catalyst 2960-L Series Switches和CDB-8P Switches 访问控制错误漏洞
英文标题:
Cisco IOS Software for Catalyst 2960-L Series Switches and Catalyst CDB-8P Switches 802.1X Authentication Bypass Vulnerability
漏洞描述
中文描述:
Cisco Catalyst 2960-L Series Switches和Cisco Catalyst CDB-8P Switches都是美国思科(Cisco)公司的产品。Cisco Catalyst 2960-L Series Switches是一款2960-L系列交换机。Cisco Catalyst CDB-8P Switches是一款数字建筑系列交换机。 Cisco Catalyst 2960-L Series Switches和Cisco Catalyst CDB-8P Switches中的802.1X功能存在访问控制错误漏洞,该漏洞源于程序没有正确处理802.1X开启的端口上的广播流量。攻击者可通过在进行身份验证之前发送广播流量利用该漏洞发送并接收802.1X开启的端口上的广播流量。
英文描述:
A vulnerability in the 802.1X feature of Cisco Catalyst 2960-L Series Switches and Cisco Catalyst CDB-8P Switches could allow an unauthenticated, adjacent attacker to forward broadcast traffic before being authenticated on the port. The vulnerability exists because broadcast traffic that is received on the 802.1X-enabled port is mishandled. An attacker could exploit this vulnerability by sending broadcast traffic on the port before being authenticated. A successful exploit could allow the attacker to send and receive broadcast traffic on the 802.1X-enabled port before authentication.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco IOS 15.2(5a)E | n/a | - | - |
cpe:2.3:a:cisco:cisco_ios_15.2(5a)e:n_a:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(5\)e2 | - | - |
cpe:2.3:o:cisco:ios:15.2\(5\)e2:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(5\)ex | - | - |
cpe:2.3:o:cisco:ios:15.2\(5\)ex:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(5a\)e | - | - |
cpe:2.3:o:cisco:ios:15.2\(5a\)e:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(5b\)e | - | - |
cpe:2.3:o:cisco:ios:15.2\(5b\)e:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(5c\)e | - | - |
cpe:2.3:o:cisco:ios:15.2\(5c\)e:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e0c | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e0c:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e1 | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e1:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e1a | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e1a:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e1s | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e1s:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e2 | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e2:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e2b | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e2b:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e3 | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e3:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(6\)e4 | - | - |
cpe:2.3:o:cisco:ios:15.2\(6\)e4:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(7\)e | - | - |
cpe:2.3:o:cisco:ios:15.2\(7\)e:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(7\)e0a | - | - |
cpe:2.3:o:cisco:ios:15.2\(7\)e0a:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(7\)e0b | - | - |
cpe:2.3:o:cisco:ios:15.2\(7\)e0b:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(7\)e0s | - | - |
cpe:2.3:o:cisco:ios:15.2\(7\)e0s:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(7a\)e0b | - | - |
cpe:2.3:o:cisco:ios:15.2\(7a\)e0b:*:*:*:*:*:*:*
|
| cisco | ios | 15.2\(7b\)e0b | - | - |
cpe:2.3:o:cisco:ios:15.2\(7b\)e0b:*:*:*:*:*:*:*
|
| cisco | ios | 15.3\(3\)jaa1 | - | - |
cpe:2.3:o:cisco:ios:15.3\(3\)jaa1:*:*:*:*:*:*:*
|
| cisco | ios | 15.3\(3\)jpj | - | - |
cpe:2.3:o:cisco:ios:15.3\(3\)jpj:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3231 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3231 |
2025-11-11 14:56:59 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202006-388 |
2025-11-11 15:10:26 | 2025-11-11 07:56:15 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202006-388
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 23
- data_sources: ['cve'] -> ['cve', 'nvd']