4.3 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.1 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.7%
A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode.
[
{
"vendor": "Cisco",
"product": "Cisco Identity Services Engine Software",
"versions": [
{
"version": "2.6.0",
"status": "affected"
},
{
"version": "2.6.0 p1",
"status": "affected"
},
{
"version": "2.6.0 p2",
"status": "affected"
},
{
"version": "2.6.0 p3",
"status": "affected"
},
{
"version": "2.6.0 p5",
"status": "affected"
},
{
"version": "2.6.0 p6",
"status": "affected"
},
{
"version": "2.6.0 p7",
"status": "affected"
},
{
"version": "2.6.0 p8",
"status": "affected"
},
{
"version": "2.6.0 p9",
"status": "affected"
},
{
"version": "2.6.0 p10",
"status": "affected"
},
{
"version": "2.6.0 p11",
"status": "affected"
},
{
"version": "2.6.0 p12",
"status": "affected"
},
{
"version": "2.7.0",
"status": "affected"
},
{
"version": "2.7.0 p1",
"status": "affected"
},
{
"version": "2.7.0 p2",
"status": "affected"
},
{
"version": "2.7.0 p3",
"status": "affected"
},
{
"version": "2.7.0 p4",
"status": "affected"
},
{
"version": "2.7.0 p5",
"status": "affected"
},
{
"version": "2.7.0 p6",
"status": "affected"
},
{
"version": "2.7.0 p7",
"status": "affected"
},
{
"version": "2.7.0 p9",
"status": "affected"
},
{
"version": "3.0.0",
"status": "affected"
},
{
"version": "3.0.0 p1",
"status": "affected"
},
{
"version": "3.0.0 p2",
"status": "affected"
},
{
"version": "3.0.0 p3",
"status": "affected"
},
{
"version": "3.0.0 p4",
"status": "affected"
},
{
"version": "3.0.0 p5",
"status": "affected"
},
{
"version": "3.0.0 p6",
"status": "affected"
},
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.0 p1",
"status": "affected"
},
{
"version": "3.1.0 p3",
"status": "affected"
},
{
"version": "3.1.0 p4",
"status": "affected"
},
{
"version": "3.1.0 p5",
"status": "affected"
},
{
"version": "3.1.0 p7",
"status": "affected"
},
{
"version": "3.2.0",
"status": "affected"
},
{
"version": "3.2.0 p1",
"status": "affected"
}
]
}
]
4.3 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.1 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.7%