Cisco IOS XR Software Cisco Discovery Protocol RCE (cisco-sa-20200205-iosxr-cdp-rce)

high Nessus Network Monitor Plugin ID 701265
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, the Cisco IOS XR Software is affected by a remote code execution vulnerability within the Cisco Discovery Protocol due to improper validation of string input. An unauthenticated, adjacent attacker can exploit this to bypass authentication and execute arbitrary commands with root privileges.


Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvr09190.

See Also

Plugin Details

Severity: High

ID: 701265

Family: SNMP

Published: 2/18/2020

Updated: 8/18/2020

Dependencies: 700532

Nessus ID: 133603

Risk Information


Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*

Patch Publication Date: 2/5/2020

Vulnerability Publication Date: 2/5/2020

Reference Information

CVE: CVE-2020-3118

IAVA: 2020-A-0041