CVE-2021-34778

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:business_220-8t-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8t-e-2g:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:business_220-8p-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8p-e-2g:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:business_220-8fp-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8fp-e-2g:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:business_220-16t-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16t-2g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:business_220-16p-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16p-2g:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:business_220-24t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4g:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:business_220-24p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4g:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:cisco:business_220-24fp-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4g:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:cisco:business_220-48t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4g:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:cisco:business_220-48p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4g:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:cisco:business_220-24t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4x:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:cisco:business_220-24p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4x:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:cisco:business_220-24fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4x:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:cisco:business_220-48t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4x:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:cisco:business_220-48p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4x:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:cisco:business_220-48fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48fp-4x:-:*:*:*:*:*:*:*

History

14 Oct 2021, 20:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.9
v3 : 4.3
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T - Vendor Advisory
CPE cpe:2.3:o:cisco:business_220-48p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48fp-4x:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-16p-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8t-e-2g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16t-2g:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-8p-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8fp-e-2g:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-8fp-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48fp-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48p-4x:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-16t-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-8p-e-2g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-48t-4x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24fp-4x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24t-4x:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48t-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24p-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24p-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-24p-4g:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-8t-e-2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-24fp-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:business_220-48t-4x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:business_220-16p-2g:-:*:*:*:*:*:*:*
CWE CWE-120

06 Oct 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-06 20:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-34778

Mitre link : CVE-2021-34778

CVE.ORG link : CVE-2021-34778


JSON object : View

Products Affected

cisco

  • business_220-8fp-e-2g
  • business_220-24fp-4x_firmware
  • business_220-48fp-4x
  • business_220-48p-4x
  • business_220-48p-4g
  • business_220-16t-2g_firmware
  • business_220-8t-e-2g_firmware
  • business_220-24p-4g_firmware
  • business_220-24t-4x
  • business_220-8t-e-2g
  • business_220-24p-4g
  • business_220-16t-2g
  • business_220-48t-4g
  • business_220-8p-e-2g_firmware
  • business_220-48p-4x_firmware
  • business_220-24fp-4g_firmware
  • business_220-24p-4x_firmware
  • business_220-48t-4x_firmware
  • business_220-24fp-4g
  • business_220-48fp-4x_firmware
  • business_220-48p-4g_firmware
  • business_220-24fp-4x
  • business_220-16p-2g
  • business_220-24t-4g_firmware
  • business_220-24t-4g
  • business_220-48t-4g_firmware
  • business_220-24t-4x_firmware
  • business_220-8p-e-2g
  • business_220-16p-2g_firmware
  • business_220-8fp-e-2g_firmware
  • business_220-48t-4x
  • business_220-24p-4x
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')