Логотип exploitDog
bind:CVE-2021-34775
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34775

Количество 3

Количество 3

nvd логотип

CVE-2021-34775

больше 4 лет назад

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-fjr2-w3c4-vvw3

больше 3 лет назад

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

EPSS: Низкий
fstec логотип

BDU:2021-05709

больше 4 лет назад

Уязвимость LLDP коммутаторов Cisco Small Business, связанная с копированием буфера без проверки входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-34775

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-fjr2-w3c4-vvw3

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05709

Уязвимость LLDP коммутаторов Cisco Small Business, связанная с копированием буфера без проверки входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 4.3
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу