First published: Wed Feb 05 2020(Updated: )
A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability exists because the Cisco Discovery Protocol parser does not properly validate input for certain fields in a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. An successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | >=7.0\(3\)f2<9.3\(2\) | |
Cisco NX-OS | >=7.0\(3\)i<7.0\(3\)i7\(8\) | |
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 31108PC-V Firmware | ||
Cisco Nexus 31108TC-V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-V Firmware | ||
Cisco Nexus 3132Q-XL Firmware | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172 Firmware | ||
Cisco Nexus 3172PQ-XL Firmware | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3172TQ-XL Firmware | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 3408-S Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3432D-S Firmware | ||
Cisco Nexus 3464C Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-XL Firmware | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 36180YC-R Firmware | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco NX-OS Nexus 9000 Series | ||
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92300YC Firmware | ||
Cisco Nexus 92304QC Switch | ||
Cisco Nexus 92348GC-X Switch | ||
Cisco Nexus 9236C Switch | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93108TC-FX Switch | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 93180LC-EX Switch | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 93180YC-FX Firmware | ||
Cisco Nexus 93216TC-FX2 Firmware | ||
Cisco Nexus 93240YC-FX2 Firmware | ||
Cisco Nexus 9332C Firmware | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus 93360YC-FX2 | ||
Cisco Nexus 9336C-FX2 Firmware | ||
Cisco Nexus N9336PQ-X | ||
Cisco Nexus 9348GC-FXP Firmware | ||
Cisco Nexus 9364c-h1 | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372PX-E Firmware | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9372TX-E Switch | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco NX-OS | >=7.1<7.3\(6\)n1\(1\) | |
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware | ||
Cisco Nexus 6001 Firmware | ||
Cisco Nexus 6004 Firmware | ||
Cisco NX-OS | <9.3\(2\) | |
Cisco NX-OS | >=14.0<14.2\(1j\) | |
Cisco UCS Manager | <3.2\(3m\) | |
Cisco UCS Manager | >=4.0<4.0\(4f\) | |
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6300 firmware | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 64108 | ||
Cisco UCS 6454 Fabric Interconnect |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3119 has a high severity rating due to its potential to allow arbitrary code execution by an unauthenticated adjacent attacker.
To mitigate CVE-2020-3119, upgrade your affected Cisco NX-OS Software to a version that is not vulnerable according to the Cisco security advisory.
CVE-2020-3119 affects multiple versions of Cisco NX-OS Software that do not parse Cisco Discovery Protocol properly.
CVE-2020-3119 is a vulnerability in the Cisco Discovery Protocol implementation that can be exploited for remote code execution on affected Cisco devices.
Yes, CVE-2020-3119 can be exploited by nearby attackers, making it necessary to secure physical access to affected devices.