CVE-2022-20824

high-risk
Published 2022-08-25

A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation of specific values that are within a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute arbitrary code with root privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, which would cause the affected device to reload, resulting in a DoS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

Do I need to act?

-
0.14% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
ADJACENT_NETWORK / LOW complexity

Affected Products (20)

Mds 9506 Firmware
Mds 9513 Firmware
Mds 9706 Firmware
Mds 9710 Firmware
Mds 9718 Firmware
Nexus 1000V Firmware
Nexus 3016 Firmware
Nexus 3016Q Firmware
Nexus 3048 Firmware
Nexus 3064 Firmware
Nexus 3064-32T Firmware
Nexus 3064-T Firmware
Nexus 3064-X Firmware
Nexus 3064T Firmware
Nexus 3064X Firmware
Nexus 3100 Firmware
Nexus 3100-V Firmware
Nexus 3100-Z Firmware
Nexus 3100V Firmware
Nexus 31108Pc-V Firmware

Affected Vendors

60
/ 100
high-risk
Severity 27/34 · High
Exploitability 1/34 · Minimal
Exposure 32/34 · Critical