Vulnerability Details : CVE-2020-3172
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.
Vulnerability category: OverflowInput validationExecute codeDenial of service
Products affected by CVE-2020-3172
- cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:14.2\(1i\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:7.3\(5\)n1\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.2\):*:*:*:*:hyper-v:*:*
- cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.2\):*:*:*:*:vsphere:*:*
- cpe:2.3:o:cisco:nx-os:7.3\(0\)d1\(0.140\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:7.3\(0\)d1\(0.146\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:7.0\(3\)i3\(0.191\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:13.2\(7.230\):*:*:*:*:*:*:*
- Cisco » Firepower Extensible Operating SystemVersions from including (>=) 2.7 and before (<) 2.7.1.106cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-3172
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-3172
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.3
|
HIGH | AV:A/AC:L/Au:N/C:C/I:C/A:C |
6.5
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
Cisco Systems, Inc. | |
8.8
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-3172
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2020-3172
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-nxos-cdp
Cisco FXOS and NX-OS Software Cisco Discovery Protocol Arbitrary Code Execution and Denial of Service VulnerabilityVendor Advisory
Jump to