QID 317188

Date Published: 2022-05-24

QID 317188: Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial of Service (DoS) Vulnerability (cisco-sa-cdp-dos-G8DPLWYG)

A vulnerability in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the service to restart, resulting in a denial of service (DoS) condition.

Affected Products
MDS 9000 Series Multilayer Switches
Nexus 1000 Virtual Edge for VMware vSphere
Nexus 1000V Switch for Microsoft Hyper-V
Nexus 1000V Switch for VMware vSphere
Nexus 3000 Series Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode
Nexus 9000 Series Switches in standalone NX-OS mode
UCS 6200 Series Fabric Interconnects
UCS 6300 Series Fabric Interconnects
UCS 6400 Series Fabric Interconnects
QID Detection Logic(Authenticated):
It checks for vulnerable version of Cisco NX-OS using show version Command.

A successful exploit could allow the attacker to cause the Cisco Discovery Protocol service to fail and restart.

  • CVSS V3 rated as Medium - 4.3 severity.
  • CVSS V2 rated as High - 6.1 severity.
  • Solution

    Customers are advised to refer to cisco-sa-cdp-dos-G8DPLWYG for more information.

    CVEs related to QID 317188

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-cdp-dos-G8DPLWYG URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-dos-G8DPLWYG