First published: Wed Feb 26 2020(Updated: )
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Note: This vulnerability is different from the following Cisco FXOS and NX-OS Software Cisco Discovery Protocol vulnerabilities that Cisco announced on Feb. 5, 2020: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Extensible Operating System | <2.6.1.187 | |
Cisco Firepower Extensible Operating System | >=2.7<2.7.1.106 | |
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4115 | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4125 firmware | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4145 firmware | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco Firepower 9300 firmware | ||
Cisco UCS Manager | <3.2\(3n\) | |
Cisco UCS Manager | >=4.0<4.0\(4g\) | |
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 6332 | ||
Cisco UCS 6332-16UP | ||
Cisco NX-OS | ||
Cisco MDS 9132T | ||
Cisco MDS 9148S | ||
Cisco MDS 9148T | ||
Cisco MDS 9216 | ||
Cisco MDS 9216 | ||
Cisco MDS 9216 | ||
Cisco MDS 9222i | ||
Cisco MDS 9500 | ||
Cisco MDS 9500 | ||
Cisco MDS 9513 Firmware | ||
Cisco MDS 9706 Firmware | ||
Cisco MDS 9710 Firmware | ||
Cisco MDS 9718 Firmware | ||
Cisco NX-OS | =5.2\(1\)sv5\(1.2\) | |
Cisco NX-OS | =5.2\(1\)sv5\(1.2\) | |
Cisco Nexus 1000V for Hyper-V | ||
Cisco Nexus 1000 Virtual Edge | ||
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 31108PC-V Firmware | ||
Cisco Nexus 31108TC-V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-V Firmware | ||
Cisco Nexus 3132Q-XL Firmware | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172 Firmware | ||
Cisco Nexus 3172PQ-XL Firmware | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3172TQ-XL Firmware | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 3408-S Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3432D-S Firmware | ||
Cisco Nexus 3464C Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-XL Firmware | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 36180YC-R Firmware | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco NX-OS | =7.3\(5\)n1\(1\) | |
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware | ||
Cisco Nexus 6001 Firmware | ||
Cisco Nexus 6004 Firmware | ||
Cisco NX-OS | =7.3\(0\)d1\(0.140\) | |
Cisco NX-OS | =7.3\(0\)d1\(0.146\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 series | ||
Cisco NX-OS | =7.0\(3\)i3\(0.191\) | |
Cisco NX-OS | =13.2\(7.230\) | |
Cisco NX-OS | =14.2\(1i\) | |
Cisco Nexus 92304QC Switch | ||
Cisco Nexus 92348GC-X Switch | ||
Cisco Nexus 9236C Switch | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93108TC-FX Switch | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 93180LC-EX Switch | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 93180YC-FX Firmware | ||
Cisco Nexus 93216TC-FX2 Firmware | ||
Cisco Nexus 93240YC-FX2 Firmware | ||
Cisco Nexus 9332C Firmware | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus 93360YC-FX2 | ||
Cisco Nexus 9336C-FX2 Firmware | ||
Cisco Nexus N9336PQ-X | ||
Cisco Nexus 9348GC-FXP Firmware | ||
Cisco Nexus 9364c-h1 | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372PX-E Firmware | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9372TX-E Switch | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3172 is rated as Critical, allowing unauthorized attackers to execute arbitrary code or cause denial of service.
To fix CVE-2020-3172, upgrade to the latest Cisco FXOS or NX-OS Software version as specified in the security advisory.
CVE-2020-3172 affects various Cisco FXOS and NX-OS devices, including the Firepower Extensible Operating System and multiple Cisco Nexus models.
No, CVE-2020-3172 requires an adjacent attacker to exploit the vulnerability, meaning they need to be on the same local network.
Currently, there are no specific workarounds for CVE-2020-3172 other than applying the recommended software updates.