CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers (2024)

Table of Contents
Products Business Needs Industry Compliance Vm Insight Research Featured Webinar Tenable One Exposure Management Platform Features 2022 Exposure Management Report Find a Partner Tenable Assure Partners Technology Partners Support Services Contact Professional Services About Us News and Events Featured Webinar Explore Cyber Exposure Tenable Blog Background Analysis Proof of concept Solution Identifying affected systems Get more information Satnam Narang Related Articles CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability What’s in Store This Year for Tenable Partners? A Lot of Growth, Including 25,000 Trees! Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out Cybersecurity Snapshot: CISA Shines Light on Cloud Security and on Hybrid IAM Systems’ Integration CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability Introducing Tenable AI Assistant: Your Generative AI Analyst To Achieve Proactive Security Cybersecurity News You Can Use Tenable Vulnerability Management Tenable Vulnerability Management Thank You Tenable Vulnerability Management Tenable Vulnerability Management Thank You Tenable Vulnerability Management Tenable Vulnerability Management Thank You Try Tenable Web App Scanning Buy Tenable Web App Scanning Thank You Try Tenable Lumin Buy Tenable Lumin Thank You Request a demo of Tenable Security Center Request a demo of Tenable OT Security Request a demo of Tenable Identity Exposure Request a Demo of Tenable Cloud Security See Tenable One In Action See Tenable Attack Surface Management In Action Thank You Try Tenable Nessus Professional Free Buy Tenable Nessus Professional Try Tenable Nessus Expert Free Buy Tenable Nessus Expert Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Featured Webinar

Tenable CloudCover

Join us monthly for a technical cloud security discussion exploring how you can gain visibility, compliance and incorporate automation into your multi-cloud environments.

Watch Now

Tenable One Exposure Management Platform

2022 Exposure Management Report

Gartner® outlines the benefits of continuous threat exposure management(CTEM) programs and recommendations for implementing a CTEM program to improve security posture.

Read the Report

Find a Partner

At Tenable, we're committed to collaborating with leading security technology resellers, distributors and ecosystem partners worldwide.

Contact Professional Services

Get a scoping call and quote for Tenable Professional Services.

Contact Us

Featured Webinar

A Cybersecurity Leader's Guide for Selecting the Best RBVM & Exposure Management Solution for Your Business

Effective vulnerability management has never been more essential for protecting your enterprise from cloud to datacenter to shop floor and beyond.

Watch Now

Your modern attack surface is exploding. Learn how you can see and understand the full cyber risk across your enterprise

Explore Cyber Exposure

Tenable Blog

Subscribe

CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers (5)

February 5, 2020 • 2 Min Read by Satnam Narang Blog Home / Cyber Exposure Alerts

CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers (6)

Researchers find several flaws in a proprietary protocol used by many Cisco devices.

Background

On February 5, researchers at Armis Security announced their discovery of five vulnerabilities in the Cisco Discovery Protocol, a proprietary protocol designed to allow for discovery and communication between Cisco devices.

CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers (7)

Analysis

CDPwn is a series of vulnerabilities in Cisco Discovery Protocol due to improper validation of Cisco Discovery Protocol messages. By sending a specially crafted packet to a vulnerable device, an unauthenticated, adjacent attacker could achieve remote code execution or create a denial of service condition.

Cisco notes in their advisories that because Cisco Discovery Protocol is a Layer 2 protocol, an attacker “must be in the same broadcast domain as the affected device.”

The following are the five vulnerabilities disclosed by Armis:

CVETitleCVSSv3
CVE-2020-3110Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability8.8
CVE-2020-3111Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability8.8
CVE-2020-3118Cisco IOS XR Software Cisco Discovery Protocol Format String Vulnerability8.8
CVE-2020-3119Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability8.8
CVE-2020-3120Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability7.4

According to Armis, these vulnerabilities “affect tens of million devices” including Cisco NX-OS switches, Cisco IOS XR routers, Cisco NCS Systems, Cisco 8000 IP Cameras, Cisco Firepower Firewalls, and Cisco IP Phone 7800 and 8800 Series.

Exploitation requires the Cisco Discovery Protocol to be enabled and Cisco notes that it is enabled by default on certain devices using NX-OS and FXOS, though it is not enabled by default on routers using Cisco IOS XR.

Proof of concept

At the time this blog post was published, there was no proof-of-concept code for any of the CDPwn vulnerabilities disclosed by Armis.

Solution

Cisco has released software updates to address these vulnerabilities. They’ve identified a list of vulnerable and not vulnerable products. The list below contains links to the respective section of each advisory that identifies vulnerable products.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 30-day trial of Tenable.io Vulnerability Management.

CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers (8)

Satnam Narang

Satnam joined Tenable in 2018. He has over 15 years experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder. He's appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.

Interests outside of work:Satnam writes poetry and makes hip-hop music. He enjoys live music, spending time with his threenieces, football and basketball, Bollywood movies and music and Grogu (Baby Yoda).

Related Articles

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

March 14, 2024

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.

What’s in Store This Year for Tenable Partners? A Lot of Growth, Including 25,000 Trees!

March 12, 2024

Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our partners.

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

March 1, 2024

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. And much more!

Cybersecurity Snapshot: CISA Shines Light on Cloud Security and on Hybrid IAM Systems’ Integration

March 15, 2024

Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against Microsoft. And don’t miss the latest CIS Benchmarks. And much more!

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

March 14, 2024

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.

Introducing Tenable AI Assistant: Your Generative AI Analyst To Achieve Proactive Security

March 13, 2024

Context is critical when it comes to analyzing and prioritizing your exposures. Learn how Tenable AI Assistant, your new Gen AI-based security analyst, can help you answer specific questions, interpret exposure findings and respond to security issues faster than ever.

  • Vulnerability Management

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable.io. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning. A representative will be in touch soon.

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Thank You

Thank you for your interest in Tenable Lumin. A representative will be in touch soon.

Request a demo of Tenable Security Center

Please fill out this form with your contact information.

A sales representative will contact you shortly to schedule a demo.

* Field is required

Request a demo of Tenable OT Security

Get the Operational Technology Security You Need.

Reduce the Risk You Don’t.

Request a demo of Tenable Identity Exposure

Continuously detect and respond to Active Directory attacks. No agents. No privileges.

On-prem and in the cloud.

Request a Demo of Tenable Cloud Security

Exceptional unified cloud security awaits you!

We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.

See
Tenable One
In Action

Exposure management for the modern attack surface.

See Tenable Attack Surface Management In Action

Know the exposure of every asset on any platform.

Thank You

Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank you.

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [emailprotected].

CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers (2024)
Top Articles
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 5805

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.