CVE-2020-3172
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
26/02/2020
Last modified:
20/04/2023
Description
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
8.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.6.1.187 (excluding) | |
cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* | 2.7 (including) | 2.7.1.106 (excluding) |
cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:* | 3.2\(3n\) (excluding) | |
cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:* | 4.0 (including) | 4.0\(4g\) (excluding) |
cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page