6.1
CVSSv2

CVE-2020-3120

Published: 05/02/2020 Updated: 20/04/2023
CVSS v2 Base Score: 6.1 | Impact Score: 6.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 543
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent malicious user to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the malicious user to exhaust system memory, causing the device to reload. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco firepower_extensible_operating_system

cisco fxos 2.4

cisco ios_xr 5.2.5

cisco ios_xr 6.4.2

cisco ios_xr 6.5.3

cisco ios_xr 6.6.25

cisco ios_xr 7.0.1

cisco nx-os

cisco ucs_manager

Vendor Advisories

A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition The vulnerability is due to a missing check when the affected software pr ...

Github Repositories

Get Cisco PSIRT OpenVuln for a provided platform/version and renders a markdown report.

OPENCHECK Get Cisco PSIRT OpenVuln for a provided platform/version and renders a markdown report Inspired by githubcom/NWMichl/openvuln Requirements: CISCO_API_KEY and CISCO_CLIENT_SECRET to access PSIRT API curl jq j2cli Env vars: export CISCO_API_KEY=myciscoapikey export CISCO_CLIENT_SECRET=mycisccolientsecret Or edit crede