Vulnerabilites related to cisco - ie-2000u-4s-g
Vulnerability from fkie_nvd
Published
2020-09-24 18:15
Modified
2024-11-21 05:31
Severity ?
Summary
A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:15.2\\(7\\)e:*:*:*:*:*:*:*", matchCriteriaId: "C63AD57E-BA66-45B6-AC6E-2BD92A19A036", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", matchCriteriaId: "7434059A-25B8-4FAC-A756-6E571348B76E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", matchCriteriaId: "858FEECF-CC69-4E68-8E8A-674643021964", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", matchCriteriaId: "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", matchCriteriaId: "8904EAF5-25E7-4A6B-8117-1859F913B83B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", matchCriteriaId: "59A990D6-B748-4AFD-B924-1D19680BD3DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", matchCriteriaId: "9C96215F-A300-4B4E-9D3A-C32E484BFC5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", matchCriteriaId: "991CBDFB-6836-4D1F-80A9-14EBCE3F855F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "18736C74-F68F-4D0B-AE2B-4BC1834EF794", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "D223C2AB-22A4-42B5-8BBB-78E2CBF23B40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "BDD3EAA2-8F25-4099-B76F-5ACC3BE34610", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "AE9BD57F-BDAC-46DD-AF87-8914B29670F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "AFCEBFFC-DD60-4CB1-A7F2-9AC09977BA4F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F7B21F-1DAA-45C7-8C24-D3A19F1C5459", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*", matchCriteriaId: "1C4F9918-E075-4F78-AFD7-0BB7FA97C1F6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "C7E00A0B-A58E-472F-B107-0FE106751F2D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "BCB45406-5216-4A11-B8D3-C44639DC26B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "215D01AE-3767-482A-85C5-3361506F0AC3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "A06E37A8-166F-4534-9089-D20B1227F4DD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "B9D6DAE3-BAD0-46D8-B899-45B955F532F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*", matchCriteriaId: "327167E8-4B65-4F9D-8760-34CDA03887CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "A0DA2253-C6A9-4749-B313-6552628A96F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "C925086A-94B9-4FE0-9FEB-3242C1217453", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "6EB14B34-4035-41D2-834B-7FB069264207", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "F257D2BE-7618-4B6A-AFCE-6D9D0084FA1D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA927CE-9D8E-4BC0-9EA6-641E7C4F71B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "9A46D298-1685-410E-879C-2EBC45C185AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "CA4ACF54-E576-4D8A-A4E6-17A37EEC53DA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*", matchCriteriaId: "196A7C06-8371-479D-973D-591DEB181739", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "EE42511E-9883-4779-A8E5-FC3E16EF2793", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*", matchCriteriaId: "DB06AD21-91A7-46B8-8F44-683828A5422D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "5DA169AF-3743-4051-B63B-FF6E1ADCD886", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "7D13CF5B-4482-4C7D-8D6A-E220F3E4F868", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*", matchCriteriaId: "92134C0A-4E5B-43EF-8439-484DF504C43C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*", matchCriteriaId: "26ECF9BD-F632-4A02-8993-C0D44B91289C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "48730DB5-94AF-4BE7-8047-52B8B47CE35A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "E3A88142-3284-4C25-8774-36004B5F9087", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "8EB76311-4B6D-4897-A683-4244E92BD570", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDA2975-CDB7-4182-A03E-D34F15CDF6F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "35B9D0B5-4BE1-490E-9A68-00A3D357BC3D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "71FA2F5A-6146-4142-96A8-552118E4BB67", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "BEF786D6-F28F-49D8-A15C-BFD0AA934355", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32B0AC-1B0A-4ED8-8532-9C7BE6E059D4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*", matchCriteriaId: "1FEFF895-6E4A-4108-BD25-D7DC83154832", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "A485A9A0-2EEC-4C13-846C-0DE2265B2A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "3B9F1ACA-9D67-4BF0-A357-40D39A61ED00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*", matchCriteriaId: "6BFEE45F-C5AC-483D-9DE6-4CEB98D80A0C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6F5BBC-4627-4A3E-B827-3CEE7EE969D0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*", matchCriteriaId: "8B2E41E2-00CE-42C4-8C91-9307D76F5D7A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "98CB2D23-B5F8-4FA9-8431-3B0124CE2140", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*", matchCriteriaId: "E8A8BA9F-3361-43CD-8031-A5DF0AD68BEB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*", matchCriteriaId: "6DFE4BB6-FC9A-42B3-B8A0-2610D71BB9B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*", matchCriteriaId: "53D13F1D-345D-45D5-9000-DAFE8A85D71B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "8CFB064E-E390-47B5-AA76-5D3D2E368055", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:connected_grid_switch_2520:-:*:*:*:*:*:*:*", matchCriteriaId: "7CD18587-5E96-4368-B153-98276C03BE2D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess_2020:-:*:*:*:*:*:*:*", matchCriteriaId: "9FFD77DA-ECD9-43DB-8405-BF3B04234CB3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess_3300:-:*:*:*:*:*:*:*", matchCriteriaId: "63B351A8-00DB-4FA6-9536-C3B8938C6D3D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "F1AE4AF5-111F-47EA-921F-B58C570B1AB5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-16tc-g:-:*:*:*:*:*:*:*", matchCriteriaId: "798DF7E1-12C7-4C07-9E0A-F3F5F7B69115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-16tc-g-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FA9D5A00-6329-4629-851A-F2E204034B25", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-16tc-gp:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E709DD-B051-4612-A295-F64D934D9DC0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-4s-g:-:*:*:*:*:*:*:*", matchCriteriaId: "B06CD752-06CA-4A41-93CF-A1CADD3DD5DA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-4t-gs:-:*:*:*:*:*:*:*", matchCriteriaId: "4F732189-B2CE-4D79-9E0B-87E9F1295D01", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-4ts-g:-:*:*:*:*:*:*:*", matchCriteriaId: "7271B8BC-0A31-41AD-A6EE-5119D8CD706C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-2000u-8tc-g:-:*:*:*:*:*:*:*", matchCriteriaId: "309ACF28-4262-4AE4-96B5-85CD45D3F4C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3000:-:*:*:*:*:*:*:*", matchCriteriaId: "92C69ABC-43E5-4440-8D14-07C6531C77E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "C0071F74-A0D3-45FE-8F58-F2F4D64AA0A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "095B70C4-0551-42BB-88B3-602DA9AE7C18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3200-8p2s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "409A8E23-765E-4DDF-A1D6-957C069485F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3200-8t2s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "EBDA8A7A-0E67-457D-B141-4A7123D88563", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8p2s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9BE362-7510-49AA-8407-9DF16C2CE83F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8p2s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "188F53F7-026B-439F-8230-7A86F88ED291", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8t2s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1D83BE1F-BEAA-4A5E-ABB3-3D1C1290C33D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8t2s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "8A025E73-71FF-4021-A531-972597B20983", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8t2x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "258F818D-A13B-487F-B885-BCD66CFD9A35", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8t2x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "96578BAC-0720-4662-9C15-10B085618ADB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8u2x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0B21C9C3-1B1F-4EAF-909B-D68A3975490A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3300-8u2x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "50D5D07D-81D0-4827-8AF9-4FA8E1C64D9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3400-8p2s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7E1424EF-E9F8-40AD-8B77-95A6EC220C2E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3400-8p2s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CE60F5EA-EE6A-45F2-8276-6859F1F976F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3400-8t2s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "10B5F733-8359-4A02-9AE6-379DCEF98B54", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-3400-8t2s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "3E58BBF6-0975-45F0-9EBE-10AD86FBE1C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-16gt4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD991C01-E65C-481C-AAA3-E08A24254DB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-16t4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "268A46F5-DBB4-47BA-966E-F5A62DDF3C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "600D74B4-4F39-4C44-BA6A-BBB54A2BD180", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99A6D521-867A-4153-9D44-9031DCEDE001", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-4s8p4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B3E68FB8-A69F-44F3-85D1-615AB5C69ED7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-4t4p4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "03563067-37A6-40C7-AC54-23EC0A6E8447", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-4tc4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "24BD8251-608E-4107-9573-46D9B8F86943", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-8gs4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "F83B7416-A5EF-49FA-85FC-88EBA723999B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-8gt4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4BE4D4D0-0637-4E34-8834-399155CD06E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "38D65414-A04C-46AF-837C-E3BA694CCF62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-8s4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "8A6CD85B-88F3-484A-8D47-41E04CF34AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4000-8t4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "08FDAAB5-0FF5-4313-A04F-7BC35061B553", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "3A359421-6CD3-43E0-94FC-20C76756C7EC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "F0F9DF32-3E0B-47FA-912A-FCE948BA768E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-5000-12s12p-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE3C21-1147-4C12-8B76-CEFC118996DD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie-5000-16s12p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8E30FA-D61A-4047-A8EC-7EA2F5DF1007", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "5F63F4C5-7784-4B83-B454-E9731210920B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "6A89AEB2-8690-4389-A896-10430A690243", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "5D464787-DC79-474F-84CA-2B4AD209C21F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "AAFC9C43-2BAE-4F4E-B084-F9FB54EEF6D1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "A6EAC97A-E3FC-490F-9D02-8CA8FA87D6DA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9B0F4029-9E79-4ADE-A851-72F18635A492", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "0C224EE6-1436-4F11-94A8-4CC96A5001F5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "77A4E545-9F74-40CC-8212-11798AF8D611", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "3D817838-BDA5-4ED8-8EC9-6C5F4C3C9C5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "842352DA-0E9B-4520-9B32-C766BEA7BF9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "66521F18-9C3D-4323-AFC1-5A4ABC476084", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "2E62F6C8-1B96-4093-8E54-05B0086842A4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5D3398-D9AE-4447-8D21-03853B41594E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "27364811-6885-49B9-ADE7-55CD69105EC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "77F72F96-3272-432C-A8B8-781C95D65A5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "036F4AFB-CBAA-4155-AC79-B2DC38E37613", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9725FF2E-25DB-42EB-B504-B169392D6C31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "683C46D6-6DBD-4C99-A577-4CE624DEDD8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "CA132B36-55CB-492A-8B85-715201E7712F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-14t2s:-:*:*:*:*:*:*:*", matchCriteriaId: "8FB643C1-EF42-440B-98B1-EAD1F2263BD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-16p:-:*:*:*:*:*:*:*", matchCriteriaId: "D7DCD235-75AC-42A8-BFD8-A6D7C0F4FD7E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-16t:-:*:*:*:*:*:*:*", matchCriteriaId: "5C1BD017-FFE6-449B-BCA2-3FF63DF0817B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-4mu-2:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C94B91-10F9-4DE0-AC24-FE74BE429BAE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-6t2s:-:*:*:*:*:*:*:*", matchCriteriaId: "90BFFD51-73C6-4A29-940D-92D1747BCB74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "67AAE6BB-F377-42A8-B837-52D8C037CB4B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-8s:-:*:*:*:*:*:*:*", matchCriteriaId: "C49447E5-A907-410D-9902-6791236C48E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3300-8t:-:*:*:*:*:*:*:*", matchCriteriaId: "4A2425A7-D37F-4B12-B2DD-96DD7ED09914", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3400-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "51880705-BE24-4849-8A61-A4D3A25592F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3400-8s:-:*:*:*:*:*:*:*", matchCriteriaId: "3555C71B-3CCF-41A4-85F7-91408D1451FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:iem-3400-8t:-:*:*:*:*:*:*:*", matchCriteriaId: "E68CBE3F-7204-45F6-A1DB-6C7FE71575C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.", }, { lang: "es", value: "Una vulnerabilidad en el manejador PROFINET para los mensajes Link Layer Discovery Protocol (LLDP) de Cisco IOS Software y Cisco IOS XE Software, podría permitir a un atacante adyacente no autenticado causar un bloqueo en un dispositivo afectado, resultando en una condición de denegación de servicio (DoS). La vulnerabilidad es debido a una comprobación insuficiente de los mensajes LLDP en el manejador de mensajes PROFINET LLDP. Un atacante podría explotar esta vulnerabilidad mediante el envío de un mensaje LLDP malicioso hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar que el dispositivo afectado se recargue.", }, ], id: "CVE-2020-3512", lastModified: "2024-11-21T05:31:13.510", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 5.7, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-24T18:15:21.323", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-388", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2020-3512
Vulnerability from cvelistv5
Published
2020-09-24 17:51
Modified
2024-11-13 18:00
Severity ?
EPSS score ?
Summary
A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5 | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.412Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200924 Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3512", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:23:36.491679Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:00:50.458Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-09-24T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-388", description: "CWE-388", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-24T17:51:35", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200924 Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5", }, ], source: { advisory: "cisco-sa-ios-profinet-dos-65qYG3W5", defect: [ [ "CSCvr54115", ], ], discovery: "INTERNAL", }, title: "Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-09-24T16:00:00", ID: "CVE-2020-3512", STATE: "PUBLIC", TITLE: "Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.4", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-388", }, ], }, ], }, references: { reference_data: [ { name: "20200924 Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5", }, ], }, source: { advisory: "cisco-sa-ios-profinet-dos-65qYG3W5", defect: [ [ "CSCvr54115", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3512", datePublished: "2020-09-24T17:51:35.464835Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T18:00:50.458Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }