A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.
Metrics
No CVSS v4.0
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Access Vector Adjacent Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00101.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 3650-12x48uq
Subscribe
Catalyst 3650-12x48ur
Subscribe
Catalyst 3650-12x48uz
Subscribe
Catalyst 3650-24pd
Subscribe
Catalyst 3650-24pdm
Subscribe
Catalyst 3650-48fqm
Subscribe
Catalyst 3650-8x24uq
Subscribe
Catalyst 3850-24xs
Subscribe
Catalyst 3850-48xs
Subscribe
Catalyst 3850-nm-2-40g
Subscribe
Catalyst 3850-nm-8-10g
Subscribe
Catalyst C9200-24p
Subscribe
Catalyst C9200-24t
Subscribe
Catalyst C9200-48p
Subscribe
Catalyst C9200-48t
Subscribe
Catalyst C9200l-24p-4g
Subscribe
Catalyst C9200l-24p-4x
Subscribe
Catalyst C9200l-24pxg-2y
Subscribe
Catalyst C9200l-24pxg-4x
Subscribe
Catalyst C9200l-24t-4g
Subscribe
Catalyst C9200l-24t-4x
Subscribe
Catalyst C9200l-48p-4g
Subscribe
Catalyst C9200l-48p-4x
Subscribe
Catalyst C9200l-48pxg-2y
Subscribe
Catalyst C9200l-48pxg-4x
Subscribe
Catalyst C9200l-48t-4g
Subscribe
Catalyst C9200l-48t-4x
Subscribe
Catalyst C9300-24p
Subscribe
Catalyst C9300-24s
Subscribe
Catalyst C9300-24t
Subscribe
Catalyst C9300-24u
Subscribe
Catalyst C9300-24ux
Subscribe
Catalyst C9300-48p
Subscribe
Catalyst C9300-48s
Subscribe
Catalyst C9300-48t
Subscribe
Catalyst C9300-48u
Subscribe
Catalyst C9300-48un
Subscribe
Catalyst C9300-48uxm
Subscribe
Catalyst C9300l-24p-4g
Subscribe
Catalyst C9300l-24p-4x
Subscribe
Catalyst C9300l-24t-4g
Subscribe
Catalyst C9300l-24t-4x
Subscribe
Catalyst C9300l-48p-4g
Subscribe
Catalyst C9300l-48p-4x
Subscribe
Catalyst C9300l-48t-4g
Subscribe
Catalyst C9300l-48t-4x
Subscribe
Catalyst C9404r
Subscribe
Catalyst C9407r
Subscribe
Catalyst C9410r
Subscribe
Catalyst C9500-12q
Subscribe
Catalyst C9500-16x
Subscribe
Catalyst C9500-24q
Subscribe
Catalyst C9500-24y4c
Subscribe
Catalyst C9500-32c
Subscribe
Catalyst C9500-32qc
Subscribe
Catalyst C9500-40x
Subscribe
Catalyst C9500-48y4c
Subscribe
Connected Grid Switch 2520
Subscribe
Ess 2020
Subscribe
Ess 3300
Subscribe
Ie-1000
Subscribe
Ie-2000u-16tc-g
Subscribe
Ie-2000u-16tc-g-x
Subscribe
Ie-2000u-16tc-gp
Subscribe
Ie-2000u-4s-g
Subscribe
Ie-2000u-4t-gs
Subscribe
Ie-2000u-4ts-g
Subscribe
Ie-2000u-8tc-g
Subscribe
Ie-3000
Subscribe
Ie-3010-16s-8pc Industrial Ethernet Switch
Subscribe
Ie-3010-24tc Industrial Ethernet Switch
Subscribe
Ie-3200-8p2s-e
Subscribe
Ie-3200-8t2s-e
Subscribe
Ie-3300-8p2s-a
Subscribe
Ie-3300-8p2s-e
Subscribe
Ie-3300-8t2s-a
Subscribe
Ie-3300-8t2s-e
Subscribe
Ie-3300-8t2x-a
Subscribe
Ie-3300-8t2x-e
Subscribe
Ie-3300-8u2x-a
Subscribe
Ie-3300-8u2x-e
Subscribe
Ie-3400-8p2s-a
Subscribe
Ie-3400-8p2s-e
Subscribe
Ie-3400-8t2s-a
Subscribe
Ie-3400-8t2s-e
Subscribe
Ie-4000-16gt4g-e
Subscribe
Ie-4000-16t4g-e
Subscribe
Ie-4000-4gc4gp4g-e
Subscribe
Ie-4000-4gs8gp4g-e
Subscribe
Ie-4000-4s8p4g-e
Subscribe
Ie-4000-4t4p4g-e
Subscribe
Ie-4000-4tc4g-e
Subscribe
Ie-4000-8gs4g-e
Subscribe
Ie-4000-8gt4g-e
Subscribe
Ie-4000-8gt8gp4g-e
Subscribe
Ie-4000-8s4g-e
Subscribe
Ie-4000-8t4g-e
Subscribe
Ie-4010-16s12p Industrial Ethernet Switch
Subscribe
Ie-4010-4s24p Industrial Ethernet Switch
Subscribe
Ie-5000-12s12p-10g
Subscribe
Ie-5000-16s12p
Subscribe
Ie 2000-16ptc-g Industrial Ethernet Switch
Subscribe
Ie 2000-16t67 Industrial Ethernet Switch
Subscribe
Ie 2000-16t67p Industrial Ethernet Switch
Subscribe
Ie 2000-16tc-g-e Industrial Ethernet Switch
Subscribe
Ie 2000-16tc-g-n Industrial Ethernet Switch
Subscribe
Ie 2000-16tc-g-x Industrial Ethernet Switch
Subscribe
Ie 2000-16tc-g Industrial Ethernet Switch
Subscribe
Ie 2000-16tc Industrial Ethernet Switch
Subscribe
Ie 2000-24t67 Industrial Ethernet Switch
Subscribe
Ie 2000-4s-ts-g Industrial Ethernet Switch
Subscribe
Ie 2000-4t-g Industrial Ethernet Switch
Subscribe
Ie 2000-4t Industrial Ethernet Switch
Subscribe
Ie 2000-4ts-g Industrial Ethernet Switch
Subscribe
Ie 2000-4ts Industrial Ethernet Switch
Subscribe
Ie 2000-8t67 Industrial Ethernet Switch
Subscribe
Ie 2000-8t67p Industrial Ethernet Switch
Subscribe
Ie 2000-8tc-g-e Industrial Ethernet Switch
Subscribe
Ie 2000-8tc-g-n Industrial Ethernet Switch
Subscribe
Ie 2000-8tc-g Industrial Ethernet Switch
Subscribe
Iem-3300-14t2s
Subscribe
Iem-3300-16p
Subscribe
Iem-3300-16t
Subscribe
Iem-3300-4mu-2
Subscribe
Iem-3300-6t2s
Subscribe
Iem-3300-8p
Subscribe
Iem-3300-8s
Subscribe
Iem-3300-8t
Subscribe
Iem-3400-8p
Subscribe
Iem-3400-8s
Subscribe
Iem-3400-8t
Subscribe
Ios Xe
Subscribe
|
Configuration 1 [-]
| AND |
|
No data.
No data.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24783 | A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T18:00:50.458Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3512
No data.
Status : Modified
Published: 2020-09-24T18:15:21.323
Modified: 2024-11-21T05:31:13.510
Link: CVE-2020-3512
No data.
OpenCVE Enrichment
No data.
EUVD