A vulnerability in the Topology Discovery Service of Cisco One Platform Kit (onePK) in Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient length restrictions when the onePK Topology Discovery Service parses Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol message to an affected device. An exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges, or to cause a process crash, which could result in a reload of the device and cause a DoS condition.

Project Subscriptions

Vendors Products
Nexus 3016 Subscribe
Nexus 3016q Subscribe
Nexus 3048 Subscribe
Nexus 3064 Subscribe
Nexus 3064t Subscribe
Nexus 3064x Subscribe
Nexus 5000 Subscribe
Nexus 5010 Subscribe
Nexus 5020 Subscribe
Nexus 6001 Subscribe
Nexus 6004 Subscribe
Nexus 6004x Subscribe
Nexus 7000 10-slot Subscribe
Nexus 7000 18-slot Subscribe
Nexus 7000 4-slot Subscribe
Nexus 7000 9-slot Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24488 A vulnerability in the Topology Discovery Service of Cisco One Platform Kit (onePK) in Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient length restrictions when the onePK Topology Discovery Service parses Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol message to an affected device. An exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges, or to cause a process crash, which could result in a reload of the device and cause a DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:16:40.773Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3217

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:56.411Z

cve-icon NVD

Status : Modified

Published: 2020-06-03T18:15:19.730

Modified: 2024-11-21T05:30:34.947

Link: CVE-2020-3217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses