{"id":3115,"date":"2021-06-19T00:46:03","date_gmt":"2021-06-19T05:46:03","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=3115"},"modified":"2021-06-19T00:46:04","modified_gmt":"2021-06-19T05:46:04","slug":"cdp-vulnerabilities-of-this-protocol","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/","title":{"rendered":"CDP &#8211; Vulnerabilities of this protocol"},"content":{"rendered":"\n<p>CDPwn is a set of vulnerabilities which we will see today affecting Cisco network infrastructure equipment (switches, routers, IP phones and IP cameras). CDPwn vulnerabilities reside in the processing of Cisco Discovery Protocol (CDP) packets and are an example of the effect that Layer 2 protocols can have on network security but&#8230; before this, what is CDP?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the CDP protocol?<\/h2>\n\n\n\n<p>CDP is a protocol that works at layer 2 of the OSI (data link) model, which allows information to be exchanged between devices that are directly connected. The information provided by CDP is as follows:<\/p>\n\n\n\n<p><strong><em>\u25b8Device Name<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Platform<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Remote computer <\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Software version<\/em><\/strong> <\/p>\n\n\n\n<p><strong><em>\u25b8Your IP address<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Remote interface<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8VTP domain name<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong><em><strong>Native VLAN<\/strong><\/em><\/p>\n\n\n\n<p><strong><em>\u25b8Duplex Status<\/em><\/strong><\/p>\n\n\n\n<p>Now we will look at the critical zero-day risks or vulnerabilities in Cisco Discovery Protocol that would allow remote code execution without requiring user interaction. Four of the five vulnerabilities are Remote Code Execution Vulnerabilities (RCE), (CVE-2020-3119 , CVE-2020-3111, CVE-2020-3110 and CVE-2020-3118), while one is a denial of service vulnerability -DoS- (CVE-2020-3120). Some of the risks derived from these zero-day vulnerabilities are: Breakdown of network segmentation, exfiltration of data from corporate network traffic, access to additional devices when carrying out attacks, &#8216;Man in the Middle&#8217; to gain privileges on network devices and last but not least the exfiltration of data from devices such as IP phones and cameras.<\/p>\n\n\n\n<p><strong><em>We can take security measures such as:<\/em><\/strong> <\/p>\n\n\n\n<p><strong><em>\u25b8Improve network segmentation to reduce broadcast domains<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8In this network segmentation use additional security measures for example using Cisco ISE using authentication to validate and monitor the network devices that connect to the network and profiling to configure the switch doors.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Update the software of the affected computers to the recommended version<\/em><\/strong><\/p>\n\n\n\n<p>Also check:<br><a href=\"https:\/\/truxgoservers.com\/blog\/blockchain-problems-and-vulnerabilities\/\">Blockchain and its problems and vulnerabilities<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/crlf-injection-a-vulnerability-that-attacks-servers\/\">CRLF Injection \u2013 A Vulnerability that attacks servers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CDPwn is a set of vulnerabilities which we will see today affecting Cisco network infrastructure equipment (switches, routers, IP phones and IP cameras). CDPwn vulnerabilities reside in the processing of Cisco Discovery Protocol (CDP) packets and are an example of the effect that Layer 2 protocols can have on network security but&#8230; before this, what [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3116,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36,197],"class_list":["post-3115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CDP - Vulnerabilities of this protocol - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Criminals are always looking for and exploiting vulnerabilities and that is why we will see some used in CDP in a malicious way.........\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CDP - Vulnerabilities of this protocol - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Criminals are always looking for and exploiting vulnerabilities and that is why we will see some used in CDP in a malicious way.........\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-19T05:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-19T05:46:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/06\/CPD.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"CDP &#8211; Vulnerabilities of this protocol\",\"datePublished\":\"2021-06-19T05:46:03+00:00\",\"dateModified\":\"2021-06-19T05:46:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/\"},\"wordCount\":306,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CPD.jpg\",\"keywords\":[\"Cybersecurity\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/\",\"name\":\"CDP - Vulnerabilities of this protocol - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CPD.jpg\",\"datePublished\":\"2021-06-19T05:46:03+00:00\",\"dateModified\":\"2021-06-19T05:46:04+00:00\",\"description\":\"Criminals are always looking for and exploiting vulnerabilities and that is why we will see some used in CDP in a malicious way.........\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CPD.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/CPD.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/cdp-vulnerabilities-of-this-protocol\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CDP &#8211; Vulnerabilities of this protocol\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CDP - Vulnerabilities of this protocol - Truxgo Server Blog","description":"Criminals are always looking for and exploiting vulnerabilities and that is why we will see some used in CDP in a malicious way.........","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/","og_locale":"es_MX","og_type":"article","og_title":"CDP - Vulnerabilities of this protocol - Truxgo Server Blog","og_description":"Criminals are always looking for and exploiting vulnerabilities and that is why we will see some used in CDP in a malicious way.........","og_url":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-06-19T05:46:03+00:00","article_modified_time":"2021-06-19T05:46:04+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/06\/CPD.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"CDP &#8211; Vulnerabilities of this protocol","datePublished":"2021-06-19T05:46:03+00:00","dateModified":"2021-06-19T05:46:04+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/"},"wordCount":306,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/06\/CPD.jpg","keywords":["Cybersecurity","Vulnerabilities"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/","url":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/","name":"CDP - Vulnerabilities of this protocol - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/06\/CPD.jpg","datePublished":"2021-06-19T05:46:03+00:00","dateModified":"2021-06-19T05:46:04+00:00","description":"Criminals are always looking for and exploiting vulnerabilities and that is why we will see some used in CDP in a malicious way.........","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/06\/CPD.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/06\/CPD.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/cdp-vulnerabilities-of-this-protocol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CDP &#8211; Vulnerabilities of this protocol"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=3115"}],"version-history":[{"count":5,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3115\/revisions"}],"predecessor-version":[{"id":3135,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3115\/revisions\/3135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/3116"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=3115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=3115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=3115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}