Description
A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability exists because the Cisco Discovery Protocol parser does not properly validate input for certain fields in a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. An successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Published: 2020-02-05
Score: 8.8 High
EPSS: 7.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24390 A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability exists because the Cisco Discovery Protocol parser does not properly validate input for certain fields in a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. An successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Nexus 3016 Nexus 3048 Nexus 3064 Nexus 3064-t Nexus 31108pc-v Nexus 31108tc-v Nexus 31128pq Nexus 3132c-z Nexus 3132q Nexus 3132q-v Nexus 3132q-xl Nexus 3164q Nexus 3172 Nexus 3172pq-xl Nexus 3172tq Nexus 3172tq-32t Nexus 3172tq-xl Nexus 3232c Nexus 3264c-e Nexus 3264q Nexus 3408-s Nexus 34180yc Nexus 3432d-s Nexus 3464c Nexus 3524 Nexus 3524-x Nexus 3524-xl Nexus 3548 Nexus 3548-x Nexus 3548-xl Nexus 36180yc-r Nexus 3636c-r Nexus 5548p Nexus 5548up Nexus 5596t Nexus 5596up Nexus 56128p Nexus 5624q Nexus 5648q Nexus 5672up Nexus 5696q Nexus 6001 Nexus 6004 Nexus 9000v Nexus 92160yc-x Nexus 92300yc Nexus 92304qc Nexus 92348gc-x Nexus 9236c Nexus 9272q Nexus 93108tc-ex Nexus 93108tc-fx Nexus 93120tx Nexus 93128tx Nexus 93180lc-ex Nexus 93180yc-ex Nexus 93180yc-fx Nexus 93216tc-fx2 Nexus 93240yc-fx2 Nexus 9332c Nexus 9332pq Nexus 93360yc-fx2 Nexus 9336c-fx2 Nexus 9336pq Aci Spine Nexus 9348gc-fxp Nexus 9364c Nexus 9372px Nexus 9372px-e Nexus 9372tx Nexus 9372tx-e Nexus 9396px Nexus 9396tx Nexus 9504 Nexus 9508 Nexus 9516 Nx-os Ucs 6248up Ucs 6296up Ucs 6300 Ucs 6324 Ucs 64108 Ucs 6454 Ucs Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:42:33.555Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3119

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.514Z

cve-icon NVD

Status : Modified

Published: 2020-02-05T18:15:10.987

Modified: 2024-11-21T05:30:21.903

Link: CVE-2020-3119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses