First published: Wed Oct 06 2021(Updated: )
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T
Credit: Qian Chen the Codesafe Team of Legendsec at Qi'anxin Group for reporting these vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Products |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-sb220-lldp-multivuls-mVRUtQ8T is classified as high due to the ability of unauthenticated adjacent attackers to exploit the vulnerabilities.
To fix cisco-sa-sb220-lldp-multivuls-mVRUtQ8T, it is recommended to update the affected Cisco Small Business 220 Series Smart Switches to the latest firmware versions provided by Cisco.
cisco-sa-sb220-lldp-multivuls-mVRUtQ8T affects Cisco Small Business 220 Series Smart Switches.
An unauthenticated, adjacent attacker could exploit cisco-sa-sb220-lldp-multivuls-mVRUtQ8T.
The Link Layer Discovery Protocol (LLDP) is a network protocol used for network devices to advertise their identity and capabilities on a local area network, which is compromised by the vulnerabilities mentioned in cisco-sa-sb220-lldp-multivuls-mVRUtQ8T.