CVE-2022-20625

Published on: Not Yet Published

Last Modified on: 10/07/2022 03:04:00 AM UTC

CVE-2022-20625 - advisory for cisco-sa-cdp-dos-G8DPLWYG

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Certain versions of Firepower 4110 from Cisco contain the following vulnerability:

A vulnerability in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the service to restart, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of Cisco Discovery Protocol messages that are processed by the Cisco Discovery Protocol service. An attacker could exploit this vulnerability by sending a series of malicious Cisco Discovery Protocol messages to an affected device. A successful exploit could allow the attacker to cause the Cisco Discovery Protocol service to fail and restart. In rare conditions, repeated failures of the process could occur, which could cause the entire device to restart.

  • CVE-2022-20625 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
  • Affected Vendor/Software: URL Logo Cisco - Cisco NX-OS Software version n/a

CVSS3 Score: 4.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
ADJACENT_NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE LOW

CVSS2 Score: 6.1 - MEDIUM

Access
Vector
Access
Complexity
Authentication
ADJACENT_NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE COMPLETE

CVE References

Description Tags Link
No Description Provided tools.cisco.com
text/html
URL Logo CISCO 20220223 Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial of Service Vulnerability

Related QID Numbers

  • 317188 Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial of Service (DoS) Vulnerability (cisco-sa-cdp-dos-G8DPLWYG)

Exploit/POC from Github

A vulnerability in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Software could allow a…

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoCiscoFirepower 4110-AllAllAll
Hardware Device InfoCiscoFirepower 4112-AllAllAll
Hardware Device InfoCiscoFirepower 4115-AllAllAll
Hardware Device InfoCiscoFirepower 4120-AllAllAll
Hardware Device InfoCiscoFirepower 4125-AllAllAll
Hardware Device InfoCiscoFirepower 4140-AllAllAll
Hardware Device InfoCiscoFirepower 4145-AllAllAll
Hardware Device InfoCiscoFirepower 4150-AllAllAll
Hardware Device InfoCiscoFirepower 9300-AllAllAll
Operating
System
CiscoFxosAllAllAllAll
Operating
System
CiscoFxosr291AllAllAll
Hardware Device InfoCiscoMds 9132t-AllAllAll
Hardware Device InfoCiscoMds 9148s-AllAllAll
Hardware Device InfoCiscoMds 9148t-AllAllAll
Hardware Device InfoCiscoMds 9222i-AllAllAll
Hardware Device InfoCiscoMds 9250i-AllAllAll
Hardware Device InfoCiscoMds 9396s-AllAllAll
Hardware Device InfoCiscoMds 9396t-AllAllAll
Hardware Device InfoCiscoMds 9506-AllAllAll
Hardware Device InfoCiscoMds 9513-AllAllAll
Hardware Device InfoCiscoMds 9706-AllAllAll
Hardware Device InfoCiscoMds 9710-AllAllAll
Hardware Device InfoCiscoMds 9718-AllAllAll
Hardware Device InfoCiscoN77-f312ck-26-AllAllAll
Hardware Device InfoCiscoN77-f324fq-25-AllAllAll
Hardware Device InfoCiscoN77-f348xp-23-AllAllAll
Hardware Device InfoCiscoN77-f430cq-36-AllAllAll
Hardware Device InfoCiscoN77-m312cq-26l-AllAllAll
Hardware Device InfoCiscoN77-m324fq-25l-AllAllAll
Hardware Device InfoCiscoN77-m348xp-23l-AllAllAll
Hardware Device InfoCiscoN7k-f248xp-25e-AllAllAll
Hardware Device InfoCiscoN7k-f306ck-25-AllAllAll
Hardware Device InfoCiscoN7k-f312fq-25-AllAllAll
Hardware Device InfoCiscoN7k-m202cf-22l-AllAllAll
Hardware Device InfoCiscoN7k-m206fq-23l-AllAllAll
Hardware Device InfoCiscoN7k-m224xp-23l-AllAllAll
Hardware Device InfoCiscoN7k-m324fq-25l-AllAllAll
Hardware Device InfoCiscoN7k-m348xp-25l-AllAllAll
Hardware Device InfoCiscoN9k-c9316d-gx-AllAllAll
Hardware Device InfoCiscoN9k-c9332d-gx2b-AllAllAll
Hardware Device InfoCiscoN9k-c9348d-gx2a-AllAllAll
Hardware Device InfoCiscoN9k-c93600cd-gx-AllAllAll
Hardware Device InfoCiscoN9k-c9364d-gx2a-AllAllAll
Hardware Device InfoCiscoNexus 1000v-AllAllAll
Hardware Device InfoCiscoNexus 1000v-AllAllAll
Hardware Device InfoCiscoNexus 1000ve-AllAllAll
Hardware Device InfoCiscoNexus 3048-AllAllAll
Hardware Device InfoCiscoNexus 31108pc-v-AllAllAll
Hardware Device InfoCiscoNexus 31108tc-v-AllAllAll
Hardware Device InfoCiscoNexus 31128pq-AllAllAll
Hardware Device InfoCiscoNexus 3132c-z-AllAllAll
Hardware Device InfoCiscoNexus 3132q-v-AllAllAll
Hardware Device InfoCiscoNexus 3132q-x-AllAllAll
Hardware Device InfoCiscoNexus 3132q-xl-AllAllAll
Hardware Device InfoCiscoNexus 3164q-AllAllAll
Hardware Device InfoCiscoNexus 3172pq-AllAllAll
Hardware Device InfoCiscoNexus 3172pq-xl-AllAllAll
Hardware Device InfoCiscoNexus 3172tq-xl-AllAllAll
Hardware Device InfoCiscoNexus 3232c-AllAllAll
Hardware Device InfoCiscoNexus 3264c-e-AllAllAll
Hardware Device InfoCiscoNexus 3264q-AllAllAll
Hardware Device InfoCiscoNexus 3408-s-AllAllAll
Hardware Device InfoCiscoNexus 34180yc-AllAllAll
Hardware Device InfoCiscoNexus 3432d-s-AllAllAll
Hardware Device InfoCiscoNexus 3464c-AllAllAll
Hardware Device InfoCiscoNexus 3524-x-AllAllAll
Hardware Device InfoCiscoNexus 3524-xl-AllAllAll
Hardware Device InfoCiscoNexus 3548-x-AllAllAll
Hardware Device InfoCiscoNexus 3548-xl-AllAllAll
Hardware Device InfoCiscoNexus 36180yc-r-AllAllAll
Hardware Device InfoCiscoNexus 3636c-r-AllAllAll
Hardware Device InfoCiscoNexus 7000 10-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 18-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 4-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 9-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 Supervisor 1-AllAllAll
Hardware Device InfoCiscoNexus 7000 Supervisor 2-AllAllAll
Hardware Device InfoCiscoNexus 7000 Supervisor 2e-AllAllAll
Hardware Device InfoCiscoNexus 7700 10-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 18-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 2-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 6-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 Supervisor 2e-AllAllAll
Hardware Device InfoCiscoNexus 7700 Supervisor 3e-AllAllAll
Hardware Device InfoCiscoNexus 92160yc-x-AllAllAll
Hardware Device InfoCiscoNexus 92300yc-AllAllAll
Hardware Device InfoCiscoNexus 92304qc-AllAllAll
Hardware Device InfoCiscoNexus 92348gc-x-AllAllAll
Hardware Device InfoCiscoNexus 9236c-AllAllAll
Hardware Device InfoCiscoNexus 9272q-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-ex-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-fx-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-fx3p-AllAllAll
Hardware Device InfoCiscoNexus 93120tx-AllAllAll
Hardware Device InfoCiscoNexus 93216tc-fx2-AllAllAll
Hardware Device InfoCiscoNexus 9332c-AllAllAll
Hardware Device InfoCiscoNexus 9336c-fx2-AllAllAll
Hardware Device InfoCiscoNexus 9336c-fx2-e-AllAllAll
Hardware Device InfoCiscoNexus 9348gc-fxp-AllAllAll
Hardware Device InfoCiscoNexus 9364c-AllAllAll
Hardware Device InfoCiscoNexus 9364c-gx-AllAllAll
Hardware Device InfoCiscoNexus 9504-AllAllAll
Hardware Device InfoCiscoNexus 9508-AllAllAll
Hardware Device InfoCiscoNexus 9516-AllAllAll
Operating
System
CiscoNx-os4.0\(1a\)aAllAllAll
Operating
System
CiscoNx-os4.1\(3f\)cAllAllAll
Operating
System
CiscoNx-os5.2\(1\)sv5\(1.3b\)AllAllAll
Operating
System
CiscoNx-os8.2\(7.34\)AllAllAll
Operating
System
CiscoNx-os9.3\(8.15\)AllAllAll
Hardware Device InfoCiscoUcs 6248up-AllAllAll
Hardware Device InfoCiscoUcs 6296up-AllAllAll
Hardware Device InfoCiscoUcs 6324-AllAllAll
Hardware Device InfoCiscoUcs 6332-AllAllAll
Hardware Device InfoCiscoUcs 6332-16up-AllAllAll
Hardware Device InfoCiscoUcs 64108-AllAllAll
Hardware Device InfoCiscoUcs 6454-AllAllAll
  • cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:fxos:r291:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n9k-c9316d-gx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n9k-c9332d-gx2b:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n9k-c9348d-gx2a:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n9k-c93600cd-gx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:n9k-c9364d-gx2a:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:microsoft_hyper-v:*:*:
  • cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*:
  • cpe:2.3:h:cisco:nexus_1000ve:-:*:*:*:*:vsphere:*:*:
  • cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:4.0\(1a\)a:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:4.1\(3f\)c:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.3b\):*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:8.2\(7.34\):*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:9.3\(8.15\):*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2022-20625 : A vulnerability in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Sof… twitter.com/i/web/status/1… 2022-02-28 18:40:59
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report