8.3
CVSSv2

CVE-2020-3172

Published: 26/02/2020 Updated: 20/04/2023
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 739
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent malicious user to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the malicious user to cause a buffer overflow that could allow the malicious user to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco firepower_extensible_operating_system

cisco ucs_manager

cisco nx-os -

cisco nx-os 5.2\\(1\\)sv5\\(1.2\\)

cisco nx-os 7.3\\(5\\)n1\\(1\\)

cisco nx-os 7.3\\(0\\)d1\\(0.140\\)

cisco nx-os 7.3\\(0\\)d1\\(0.146\\)

cisco nx-os 7.0\\(3\\)i3\\(0.191\\)

cisco nx-os 13.2\\(7.230\\)

cisco nx-os 14.2\\(1i\\)

Vendor Advisories

A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet h ...

Github Repositories

Get Cisco PSIRT OpenVuln for a provided platform/version and renders a markdown report.

OPENCHECK Get Cisco PSIRT OpenVuln for a provided platform/version and renders a markdown report Inspired by githubcom/NWMichl/openvuln Requirements: CISCO_API_KEY and CISCO_CLIENT_SECRET to access PSIRT API curl jq j2cli Env vars: export CISCO_API_KEY=myciscoapikey export CISCO_CLIENT_SECRET=mycisccolientsecret Or edit crede