CVE-2020-3119

A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability exists because the Cisco Discovery Protocol parser does not properly validate input for certain fields in a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. An successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ciscoCNA
8.8 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
VendorProductVersion
cisconx-os
7.0\(3\)f2 ≤
𝑥
< 9.3\(2\)
cisconx-os
7.0\(3\)i ≤
𝑥
< 7.0\(3\)i7\(8\)
cisconx-os
7.1 ≤
𝑥
< 7.3\(6\)n1\(1\)
cisconx-os
𝑥
< 9.3\(2\)
cisconx-os
14.0 ≤
𝑥
< 14.2\(1j\)
ciscoucs_manager
𝑥
< 3.2\(3m\)
ciscoucs_manager
4.0 ≤
𝑥
< 4.0\(4f\)
𝑥
= Vulnerable software versions