QID 317219

Date Published: 2022-09-01

QID 317219: Cisco FXOS and Nexus Operating System (NX-OS) Software Cisco Discovery Protocol Denial of Service (DoS) and Arbitrary Code Execution Vulnerability (cisco-sa-nxos-cdp-dos-ce-wWvPucC9)

A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device.

Affected Products
Firepower 4100 Series
Firepower 9300 Security Appliances
MDS 9000 Series Multilayer Switches
Nexus 1000 Virtual Edge for VMware vSphere
Nexus 1000V Switch for Microsoft Hyper-V
Nexus 1000V Switch for VMware vSphere
Nexus 3000 Series Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 9000 Series Fabric Switches in ACI mode
Nexus 9000 Series Switches in standalone NX-OS mode
UCS 6200 Series Fabric Interconnects
UCS 6300 Series Fabric Interconnects
UCS 6400 Series Fabric Interconnects
QID Detection Logic(Authenticated):
It checks for vulnerable version of Cisco NX-OS using show version Command.

A successful exploit could allow the attacker to execute arbitrary code with root privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, which would cause the affected device to reload, resulting in a DoS condition.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 8.3 severity.
  • Solution

    Customers are advised to refer to cisco-sa-nxos-cdp-dos-ce-wWvPucC9 for more information.

    CVEs related to QID 317219

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-nxos-cdp-dos-ce-wWvPucC9 URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cdp-dos-ce-wWvPucC9