CVE-2022-20846
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
15/11/2024
Last modified:
05/08/2025
Description
A vulnerability in the Cisco&nbsp;Discovery Protocol implementation for Cisco&nbsp;IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco&nbsp;Discovery Protocol process to reload on an affected device.<br />
This vulnerability is due to a heap buffer overflow in certain Cisco&nbsp;Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco&nbsp;Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco&nbsp;Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco&nbsp;Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). &nbsp;Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco&nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.31:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.90:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs4k-tl1-GNnLwC6
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2



