Unknown
CVE-2021-34775
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2021-34775
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- business 220-16p-2g firmware,
- business 220-16t-2g firmware,
- business 220-24fp-4g firmware,
- business 220-24fp-4x firmware,
- business 220-24p-4g firmware,
- business 220-24p-4x firmware,
- business 220-24t-4g firmware,
- business 220-24t-4x firmware,
- business 220-48fp-4x firmware,
- business 220-48p-4g firmware,
- business 220-48p-4x firmware,
- business 220-48t-4g firmware,
- business 220-48t-4x firmware,
- business 220-8fp-e-2g firmware,
- business 220-8p-e-2g firmware,
- business 220-8t-e-2g firmware
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: