Cisco Systems, Inc.(R)   Home|Log In|Register|Contacts & Feedback|Help|Site Map   
  
Select a Location / Language
Hierarchical Navigation
TECHNOLOGIES
IP ADDRESSING AND APPLICATION SERVICES
PROTOCOL GROUPS
IP APPLICATION SERVICES
TECHNICAL DOCUMENTATION
TECH NOTES
Cisco's Response to the CDP Issue


IP APPLICATION SERVICES
Cisco's Response to the CDP Issue
Downloads
Cisco's Response to the CDP Issue

Document ID: 13621



This is not a Cisco Security Advisory.

There is a vulnerability in how Cisco routers and switches are handling Cisco Discovery Protocol (CDP). By sending a large amount of CDP neighbor announcements, it is possible to consume all of an available devices's memory, causing a crash or some other abnormal behavior. This vulnerability is assigned the Cisco bug ID CSCdu09909 for Cisco IOS, and CSCdv57576 for CatOS. This vulnerability was discovered by fx@phenoelit.de.

All releases, prior fixed releases, of IOS and CatOS are vulnerable. All Catalyst models are vulnerable.

To follow the bug ID links below and see detailed bug information, you must be a registered user and you must be logged in.

CSCdu09909

CSCdv57576

In order to trigger this vulnerability, an attacker must be on the same segment as the target device. This vulnerability can not be exploited over the Internet unless an attacker has a helper program already planted on the internal network.

The workaround for this vulnerability is to disable CDP. CDP can be disabled either for the whole device or on a selected links. In order to disable CDP for the whole router, execute the following global command:

Router# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)# no cdp run

Alternatively, CDP can be disabled on a particular interface. This can be done using the following commands:

Router# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)# interface Ethernet0
Router(config-if)# no cdp enable
To disable CDP for the whole Catalyst, execute the following command:
Console> (enable) set cdp disable

Alternatively, CDP can be disabled on a particular interface. In this example CDP is disabled for the port 23 on a module 1:

Console> (enable) set cdp disable 1/23

In this particular case, Cisco Systems advises all customers to disable CDP for the whole device. If you must keep CDP running for any purpose then you should consider disabling it on all interfaces/ports that are facing host farms or outward of your administrative domain (for example, toward an upstream Internet Service Provider (ISP) or xdigital subscriber line (xDSL) customers).

This vulnerability has been fixed in the following interim Cisco IOS® Software releases:

12.2(3.6)B
12.2(4.1)S
12.2(3.6)PB
12.2(3.6)T
12.1(10.1)
12.2(3.6)

All later Cisco IOS releases should contain this fix.

Please note that interim images are built at regular intervals between maintenance releases and receive less testing. Interim images should be selected only if there is no other suitable release that addresses the vulnerability, and interim images should be upgraded to the next available maintenance release as soon as possible. Interim releases are not available through manufacturing, and usually they are not available for customer download from CCO without an earlier arrangement with the Cisco Systems Technical Assistance Center (TAC).

At this moment Cisco Systems does not have estimated dates when fixed versions of CatOS will be available.

Cisco Systems would like to thank Phenoelit on his cooperation on this issue.

Revision History

Revision 1.0 2001-October-10 Initial public release.
Revision 1.1 2001-October-12 Added information about Catalyst



Updated: Jul 27, 2004 Document ID: 13621


Guest




INDUSTRY SOLUTIONS | NETWORKING SOLUTIONS | PRODUCTS & SERVICES | ORDERING | TECHNICAL SUPPORT | LEARNING & EVENTS | PARTNERS & RESELLERS | ABOUT CISCO
Home | Log In | Register | Contacts & Feedback | Help | Site Map
© 1992-2004 Cisco Systems, Inc. All rights reserved. Terms and Conditions, Privacy Statement, Cookie Policy and Trademarks of Cisco Systems, Inc.