Vulnerability Details : CVE-2020-3120
A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to exhaust system memory, causing the device to reload. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Vulnerability category: OverflowDenial of service
Products affected by CVE-2020-3120
- cpe:2.3:o:cisco:ios_xr:5.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*
- Cisco » Firepower Extensible Operating SystemVersions from including (>=) 2.7 and before (<) 2.7.1.106cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*
- Cisco » Firepower Extensible Operating SystemVersions from including (>=) 2.6 and before (<) 2.6.1.187cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:fxos:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-3120
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-3120
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | AV:A/AC:L/Au:N/C:N/I:N/A:C |
6.5
|
6.9
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
2.8
|
4.0
|
Cisco Systems, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-3120
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2020-3120
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos
Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service VulnerabilityVendor Advisory
-
http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html
Cisco Discovery Protocol (CDP) Remote Device Takeover ≈ Packet StormThird Party Advisory;VDB Entry
Jump to