CVE-2020-3119
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
05/02/2020
Last modified:
12/02/2020
Description
A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability exists because the Cisco Discovery Protocol parser does not properly validate input for certain fields in a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. An successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
8.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* | 7.0\(3\)f2 (including) | 9.3\(2\) (excluding) |
| cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* | 7.0\(3\)i (including) | 7.0\(3\)i7\(8\) (excluding) |
| cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



