CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
44.2%
A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods: An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state. An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP. An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | 1000_integrated_services_router | - | cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1100-4g\/6g_integrated_services_router | - | cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1100-4p_integrated_services_router | - | cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1100-8p_integrated_services_router | - | cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1100_integrated_services_router | - | cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1101-4p_integrated_services_router | - | cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1101_integrated_services_router | - | cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1109-2p_integrated_services_router | - | cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1109-4p_integrated_services_router | - | cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:* |
cisco | 1109_integrated_services_router | - | cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
44.2%