Логотип exploitDog
bind:CVE-2021-34780
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34780

Количество 3

Количество 3

nvd логотип

CVE-2021-34780

больше 4 лет назад

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-x42j-7wwr-wxrm

больше 3 лет назад

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

EPSS: Низкий
fstec логотип

BDU:2021-05356

больше 4 лет назад

Уязвимость реализации протокола Link Layer Discovery Protocol (LLDP) микропрограммного обеспечения маршрутизаторов Cisco Small Business 220, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-34780

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-x42j-7wwr-wxrm

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05356

Уязвимость реализации протокола Link Layer Discovery Protocol (LLDP) микропрограммного обеспечения маршрутизаторов Cisco Small Business 220, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 8.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу