Security News > 2020 > February > Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks

Cisco Discovery Protocol Flaws Expose Tens of Millions of Devices to Attacks
2020-02-05 16:10

Tens of millions of Cisco devices deployed in enterprise environments are exposed to attacks due to vulnerabilities identified by researchers in a proprietary discovery protocol they all use.

The problematic protocol is the Cisco Discovery Protocol, a Layer 2 network protocol used to obtain information about Cisco devices present on the local network.

The code execution flaws impact the NX-OS, IOS XR, IP phone, and IP camera implementations, while the DoS issue affects the FXOS, IOS XR and NX-OS implementations of CDP. In order to exploit the weaknesses, an attacker who has gained access to the network needs to send specially crafted CDP packets to the targeted device.

Armis says, compromising a switch using a CDPwn attack can allow hackers to intercept network traffic and launch man-in-the-middle attacks.

"Additionally, a switch is the ultimate hiding position for an attacker - it is an relatively unsecured device, that doesn't allow any security agent on it, and an attacker has the ability to launch attacks from it to the devices in the network. An attacker could also hide the malicious traffic he generated from any other network taps that are there to inspect traffic," Armis explained in its report on CDPwn.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/yaWxMKMoN0U/cisco-discovery-protocol-flaws-expose-tens-millions-devices-attacks

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Cisco 4448 233 3131 1876 610 5850
Protocol 12 0 4 13 0 17