CVE-2020-3172
26.02.2020, 17:15
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | firepower_extensible_operating_system | 𝑥 < 2.6.1.187 |
cisco | firepower_extensible_operating_system | 2.7 ≤ 𝑥 < 2.7.1.106 |
cisco | ucs_manager | 𝑥 < 3.2\(3n\) |
cisco | ucs_manager | 4.0 ≤ 𝑥 < 4.0\(4g\) |
cisco | nx-os | - |
cisco | nx-os | 5.2\(1\)sv5\(1.2\) |
cisco | nx-os | 5.2\(1\)sv5\(1.2\) |
cisco | nx-os | - |
cisco | nx-os | 7.3\(5\)n1\(1\) |
cisco | nx-os | - |
cisco | nx-os | 7.3\(0\)d1\(0.140\) |
cisco | nx-os | 7.3\(0\)d1\(0.146\) |
cisco | nx-os | 7.0\(3\)i3\(0.191\) |
cisco | nx-os | 13.2\(7.230\) |
cisco | nx-os | 14.2\(1i\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration