CVE-2020-3120
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
05/02/2020
Last modified:
20/04/2023
Description
A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to exhaust system memory, causing the device to reload. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
6.10
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.3.1.173 (including) | |
| cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.6 (including) | 2.6.1.187 (excluding) |
| cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.7 (including) | 2.7.1.106 (excluding) |
| cpe:2.3:o:cisco:fxos:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:5.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



