gsd-2023-20213
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-20213", "id": "GSD-2023-20213" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20213" ], "details": "A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode.", "id": "GSD-2023-20213", "modified": "2023-12-13T01:20:27.772436Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Identity Services Engine Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.6.0" }, { "version_affected": "=", "version_value": "2.6.0 p1" }, { "version_affected": "=", "version_value": "2.6.0 p2" }, { "version_affected": "=", "version_value": "2.6.0 p3" }, { "version_affected": "=", "version_value": "2.6.0 p5" }, { "version_affected": "=", "version_value": "2.6.0 p6" }, { "version_affected": "=", "version_value": "2.6.0 p7" }, { "version_affected": "=", "version_value": "2.6.0 p8" }, { "version_affected": "=", "version_value": "2.6.0 p9" }, { "version_affected": "=", "version_value": "2.6.0 p10" }, { "version_affected": "=", "version_value": "2.6.0 p11" }, { "version_affected": "=", "version_value": "2.6.0 p12" }, { "version_affected": "=", "version_value": "2.7.0" }, { "version_affected": "=", "version_value": "2.7.0 p1" }, { "version_affected": "=", "version_value": "2.7.0 p2" }, { "version_affected": "=", "version_value": "2.7.0 p3" }, { "version_affected": "=", "version_value": "2.7.0 p4" }, { "version_affected": "=", "version_value": "2.7.0 p5" }, { "version_affected": "=", "version_value": "2.7.0 p6" }, { "version_affected": "=", "version_value": "2.7.0 p7" }, { "version_affected": "=", "version_value": "2.7.0 p9" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.0.0 p1" }, { "version_affected": "=", "version_value": "3.0.0 p2" }, { "version_affected": "=", "version_value": "3.0.0 p3" }, { "version_affected": "=", "version_value": "3.0.0 p4" }, { "version_affected": "=", "version_value": "3.0.0 p5" }, { "version_affected": "=", "version_value": "3.0.0 p6" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.0 p1" }, { "version_affected": "=", "version_value": "3.1.0 p3" }, { "version_affected": "=", "version_value": "3.1.0 p4" }, { "version_affected": "=", "version_value": "3.1.0 p5" }, { "version_affected": "=", "version_value": "3.1.0 p7" }, { "version_affected": "=", "version_value": "3.2.0" }, { "version_affected": "=", "version_value": "3.2.0 p1" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-787", "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ] }, "source": { "advisory": "cisco-sa-ise-file-upload-FceLP4xs", "defects": [ "CSCwc71225" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "1F22FABF-2831-4895-B0A9-283B98398F43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "B83D0F20-5A43-4583-AFAF-CD9D20352437", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "2887A2C0-BADA-41D3-AA6A-F10BC58AA7F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "matchCriteriaId": "5ADE32BD-C500-47D8-86D6-B08F55F1BBDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "matchCriteriaId": "22F23314-96BE-42F6-AE07-CC13F8856029", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "matchCriteriaId": "76265489-E5DC-46F1-9475-2FDFCEE32CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "matchCriteriaId": "9517A1B4-45BA-44DD-9122-C86BF9075EFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*", "matchCriteriaId": "1BC35A24-68DB-43C5-A817-9B35018F5990", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch8:*:*:*:*:*:*", "matchCriteriaId": "DC94625A-6ED0-439B-A2DA-15A49B2FED93", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch9:*:*:*:*:*:*", "matchCriteriaId": "2392609B-AFEA-4BBD-99FA-E90AD4C2AE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "A1063044-BCD7-487F-9880-141C30547E36", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "DA42E65A-7207-48B8-BE1B-0B352201BC09", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "75DDAF38-4D5F-4EE4-A428-68D28FC0DA96", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "matchCriteriaId": "C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "matchCriteriaId": "2B3A267A-5FEA-426D-903E-BD3F4F94A1A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", "matchCriteriaId": "B1B3207B-1B9C-41AA-8EF6-8478458462E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*", "matchCriteriaId": "C5B9E7F3-B0F2-4A6A-B939-A62E9B12CCEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "matchCriteriaId": "C4DB9726-532F-45CE-81FD-45F2F6C7CE51", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*", "matchCriteriaId": "2E8F0066-0EC0-41FD-80BE-55C4ED5F6B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch2:*:*:*:*:*:*", "matchCriteriaId": "A1E81F86-7ED6-4D6C-8DAF-09EB2A7BC496", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*", "matchCriteriaId": "5D1765DB-1BEF-4CE9-8B86-B91F709600EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*", "matchCriteriaId": "3D1E80EF-C3FD-4F7A-B63D-0EAA5C878B11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:*", "matchCriteriaId": "095F27EC-5713-4D4F-AD06-57D3DF068B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*", "matchCriteriaId": "36722B6C-64A5-4D00-94E1-442878C37A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2:patch1:*:*:*:*:*:*", "matchCriteriaId": "7EEEA06A-AD58-48D3-8975-B21A961985B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n de procesamiento CDP de Cisco ISE podr\u00eda permitir que un atacante adyacente no autenticado cause una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS) del proceso CDP en un dispositivo afectado. Esta vulnerabilidad se debe a una verificaci\u00f3n de los l\u00edmites insuficiente cuando un dispositivo afectado procesa el tr\u00e1fico CDP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico CDP manipulado al dispositivo. Un exploit exitoso podr\u00eda provocar que el proceso CDP falle, lo que afectar\u00eda el descubrimiento de vecinos y la capacidad de Cisco ISE para determinar la accesibilidad de los dispositivos remotos. Despu\u00e9s de una falla, el proceso CDP se debe reiniciar manualmente usando el comando cdp enable en el modo de configuraci\u00f3n de interfaz." } ], "id": "CVE-2023-20213", "lastModified": "2024-01-25T17:15:37.153", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2023-11-01T17:15:11.500", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.