CVE-2020-3172

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
26/02/2020
Last modified:
20/04/2023

Description

A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* 2.6.1.187 (excluding)
cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* 2.7 (including) 2.7.1.106 (excluding)
cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:* 3.2\(3n\) (excluding)
cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:* 4.0 (including) 4.0\(4g\) (excluding)
cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*