Infrastructure Briefing — Patch Cisco CDPwn remote code execution flaws
Cisco disclosed five CDP parsing bugs ("CDPwn") in Catalyst switches, routers, IP phones, and UCS servers that allow adjacent attackers to execute code or cause device reboots. Organizations running Layer 2 Cisco gear must deploy the February 5, 2020 security updates and enable available mitigations to block crafted CDP traffic.
Executive briefing: Cisco patched five flaws in its implementation of Cisco Discovery Protocol (CDP) across Catalyst switches, routers, IP phones, and UCS servers. Crafted Layer 2 CDP packets could trigger stack buffer overflows or format string issues, leading to remote code execution (CVE-2020-3118, CVE-2020-3119) or denial of service on adjacent networks.
Why it matters
- Exposure: CDP is enabled by default on Cisco access and data center platforms, so switch uplinks, IP phones, and hypervisor management ports were all reachable from the local network.
- Impact: Successful exploitation could give attackers control of Layer 2 infrastructure, allowing traffic interception or further lateral movement without triggering perimeter defenses.
- Operational risk: IP telephony outages and switch reloads can disrupt campus and branch operations if exploitation causes repeated crashes.
Operator actions
- Patch priority: Apply the February 5, 2020 software updates for affected Catalyst, Nexus, UCS, and IP phone platforms per Cisco advisory guidance.
- Restrict CDP: Disable CDP on interfaces where it is not operationally required, especially internet-facing and inter-VLAN trunk ports.
- Monitor for abuse: Inspect switch logs and telemetry for malformed CDP packets or unexplained reloads on access switches and UCS fabric interconnects.
- Validate phone exposure: Update Cisco IP phone firmware and ensure voice VLANs are isolated from untrusted client segments.
Continue in the Infrastructure pillar
Return to the hub for curated research and deep-dive guides.
Latest guides
-
Edge Resilience Infrastructure Guide — Zeph Tech
Engineer resilient edge estates using ETSI MEC standards, DOE grid assessments, and GSMA availability benchmarks documented by Zeph Tech.
-
Infrastructure Resilience Guide — Zeph Tech
Coordinate capacity planning, supply chain, and reliability operations using DOE grid programmes, Uptime Institute benchmarks, and NERC reliability mandates covered by Zeph Tech.
-
Infrastructure Sustainability Reporting Guide — Zeph Tech
Produce audit-ready infrastructure sustainability disclosures aligned with CSRD, IFRS S2, and sector-specific benchmarks curated by Zeph Tech.




