CVE-2020-3120

A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to exhaust system memory, causing the device to reload. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ciscoCNA
7.4 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
ciscofirepower_extensible_operating_system
𝑥
≤ 2.3.1.173
ciscofirepower_extensible_operating_system
2.6 ≤
𝑥
< 2.6.1.187
ciscofirepower_extensible_operating_system
2.7 ≤
𝑥
< 2.7.1.106
ciscofxos
2.4
ciscoios_xr
5.2.5
ciscoios_xr
6.4.2
ciscoios_xr
6.5.3
ciscoios_xr
6.6.25
ciscoios_xr
7.0.1
cisconx-os
5.2 ≤
𝑥
< 6.2\(29\)
cisconx-os
7.3 ≤
𝑥
< 8.4\(1a\)
cisconx-os
5.2 ≤
𝑥
< 5.2\(1\)sv5\(1.3\)
cisconx-os
𝑥
≤ 5.2
cisconx-os
𝑥
< 5.2\(1\)sv3\(4.1b\)
cisconx-os
7.0\(3\)f2 ≤
𝑥
< 9.3\(2\)
cisconx-os
7.0\(3\)i ≤
𝑥
< 7.0\(3\)i7\(8\)
cisconx-os
𝑥
< 7.3\(6\)n1\(1\)
cisconx-os
𝑥
< 6.2\(24\)
cisconx-os
7.2 ≤
𝑥
< 7.3\(5\)d1\(1\)
cisconx-os
8.0 ≤
𝑥
< 8.2\(5\)
cisconx-os
8.3 ≤
𝑥
< 8.4\(2\)
cisconx-os
𝑥
< 13.2\(9b\)
cisconx-os
14.0 ≤
𝑥
< 14.2\(1j\)
ciscoucs_manager
𝑥
< 3.2\(3m\)
ciscoucs_manager
4.0 ≤
𝑥
< 4.0\(4g\)
𝑥
= Vulnerable software versions