Cisco IOS CDP Neighbor Announcement DoS

high Nessus Plugin ID 17793

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

There is a vulnerability in how Cisco routers handle CDP. By sending a large amount of CDP neighbor announcements it is possible to consume all of the router's available memory.

Note that a device would need to be configured to use CDP and an attacker would need to be on the same segment as the target router in order to exploit this vulnerability.

Solution

Apply the relevant patch references in the Cisco Security Advisory.

See Also

http://www.nessus.org/u?dddb2797

https://seclists.org/bugtraq/2001/Oct/62

Plugin Details

Severity: High

ID: 17793

File Name: cisco_cdp_neighbor_announcement_dos.nasl

Version: 1.11

Type: local

Family: CISCO

Published: 1/10/2012

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2001-1071

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/9/2001

Vulnerability Publication Date: 10/9/2001

Reference Information

CVE: CVE-2001-1071

BID: 3412

CERT: 139491

CISCO-BUG-ID: CSCdu09909