A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| cisco | firepower_extensible_operating_system | 2.6.1.187 | - |
| cisco | firepower_extensible_operating_system | 2.7 - 2.7.1.106 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15
Affected Products
2
References
cisco / firepower_extensible_operating_system
| - |
| cisco | ucs_manager | 3.2\(3n\) | - |
| cisco | ucs_manager | 4.0 - 4.0\(4g\) | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
| cisco | nx-os | - | - |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact