From 664f0242b96b8b9fa8b0a4a62339bd9adfdb36b2 Mon Sep 17 00:00:00 2001 From: santosomar Date: Thu, 23 Sep 2021 02:18:02 +0000 Subject: [PATCH] Adding Cisco CVE-2021-34703 --- 2021/34xxx/CVE-2021-34703.json | 82 +++++++++++++++++++++++++++++++--- 1 file changed, 75 insertions(+), 7 deletions(-) diff --git a/2021/34xxx/CVE-2021-34703.json b/2021/34xxx/CVE-2021-34703.json index 30c245a8f85..006d2998dd3 100644 --- a/2021/34xxx/CVE-2021-34703.json +++ b/2021/34xxx/CVE-2021-34703.json @@ -1,18 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2021-09-22T16:00:00", "ID": "CVE-2021-34703", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Cisco IOS and IOS XE Software Link Layer Discovery Protocol Denial of Service Vulnerability" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco IOS ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\r A vulnerability in the Link Layer Discovery Protocol (LLDP) message parser of Cisco IOS Software and Cisco IOS XE Software could allow an attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition.\r This vulnerability is due to improper initialization of a buffer. An attacker could exploit this vulnerability via any of the following methods:\r \r An authenticated, remote attacker could access the LLDP neighbor table via either the CLI or SNMP while the device is in a specific state.\r An unauthenticated, adjacent attacker could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then waiting for an administrator of the device or a network management system (NMS) managing the device to retrieve the LLDP neighbor table of the device via either the CLI or SNMP.\r An authenticated, adjacent attacker with SNMP read-only credentials or low privileges on the device CLI could corrupt the LLDP neighbor table by injecting specific LLDP frames into the network and then accessing the LLDP neighbor table via either the CLI or SNMP.\r \r A successful exploit could allow the attacker to cause the affected device to crash, resulting in a reload of the device.\r " } ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "6.8", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-456" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20210922 Cisco IOS and IOS XE Software Link Layer Discovery Protocol Denial of Service Vulnerability", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lldp-dos-sBnuHSjT" + } + ] + }, + "source": { + "advisory": "cisco-sa-lldp-dos-sBnuHSjT", + "defect": [ + [ + "CSCvv12527" + ] + ], + "discovery": "INTERNAL" } -} \ No newline at end of file +}