PT-2022-4427 · Cisco · Cisco Fxos +2
Published
2022-08-24
·
Updated
2022-10-01
·
CVE-2022-20824
8.8
High
Base vector | Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Cisco FXOS Software (affected versions not specified)
Cisco NX-OS Software (affected versions not specified)
Description:
A vulnerability in the Cisco Discovery Protocol feature could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. This issue is due to improper input validation of specific values within a Cisco Discovery Protocol message. An attacker could exploit this by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute arbitrary code with root privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, resulting in a DoS condition. The attacker must be in the same broadcast domain as the affected device to exploit this vulnerability.
Recommendations:
For Cisco FXOS Software, update to a version that fixes the improper input validation issue in the Cisco Discovery Protocol feature.
For Cisco NX-OS Software, update to a version that fixes the improper input validation issue in the Cisco Discovery Protocol feature.
As a temporary workaround, consider restricting access to the Cisco Discovery Protocol to minimize the risk of exploitation.
Fix
DoS
Memory Corruption
Stack Overflow
Related Identifiers
Affected Products
References · 7
- https://nvd.nist.gov/vuln/detail/CVE-2022-20824 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9 · Vendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9 · Vendor Advisory
- https://bdu.fstec.ru/vul/2022-05291 · Security Note
- https://t.me/true_secator/3342 · Telegram Post
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9 · Note
- https://security.netapp.com/advisory/ntap-20220923-0001 · Note