• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Cisco Releases Critical Patches for Millions of Phones, Routers, More

Cisco patches phones routers

Cisco has released patches for not one, not two, not three but five high-risk vulnerabilities affecting potentially tens of millions of its devices. If left unaddressed, these exposures could allow remote attackers to take control of desktop phones, switches, routers, and even security cameras. Despite the massive assortment of possible targets, as of yet, there’s no evidence of cyber criminals exploiting these vulnerabilities in the wild. However, the risk is great enough that both Cisco as well as the government’s Cybersecurity and Infrastructure Security Agency have urged Cisco customers to take immediate action.

Dubbed CDPwn by Armis, the cyber security firm that first brought them to Cisco’s attention, the vulnerabilities exist within the Cisco Discovery Protocol (CDP). This Layer 2 protocol is broadly used among Cisco utilities to foster interactions between networking devices, including those using different network-layer protocols. All an attacker would need to do to take advantage of an unpatched system would be to put together a malicious CDP packet and direct it at a target device.

IT teams should immediately begin patching against:

  • a Cisco IP Phone Remote Code Execution and DoS Vulnerability. Essentially, this allows a remote, unauthenticated attacker to execute malicious code by way of CDP with root privileges. The attacker could also use this power to force a phone to reboot leading to a DoS situation. The list of potentially impacted endpoints is long and includes the 7832 and 8832 versions of Cisco’s IP Conference Phone as well as multiple models from the 6800, 7800, and 8800 series of IP Phones.
  • a Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability. As a result of this weakness, hackers can execute malicious on vulnerable devices. The list of potentially affected devices includes switches from the Nexus 3000, 5500, and 6000 lines as well as UCS 6200, 6300, and 6400 series of Fabric Interconnects.
  • a Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and DoS Vulnerability. Hackers can inject malicious code onto affected cameras or force them to reboot. This vulnerability affects unpatched devices from Cisco’s Video Surveillance 8000 Series of IP cameras.
  • a Cisco IOS XR Software Cisco Discovery Protocol Format String Vulnerability. Similar to the other vulnerabilities, this one will allow attackers to launch malicious code with admin rights, in this case provided the targeted devices are running either the 32-bit or the 64-bit version of Cisco’s IOS XR Software. Affected devices include ASR 9000 Series Aggregation Services Routers, Carrier Routing System (CRS) devices, and multiple models from Cisco’s Network Convergence System series of routers.
  • a Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability. By leveraging this weak point, attackers can force an unpatched device running either Cisco’s FXOS, IOS XR, or its NX-OS Software platform to reboot, possibly leading to a DoS scenario. Once again, the list of affected products is sizeable. It includes representatives from the ASR, Firepower, NCS, Nexus, and UCS product families.

Next Steps: Don’t let vulnerabilities sit unpatched 

The number of potentially-impacted devices is high and so too is the level of risk organizations face. That makes it imperative for IT to begin patching vulnerable solutions ASAP. However, the size of the task isn’t the only complicating factor. Many of the devices that require updates don’t support automatic patch deployments, putting the onus on IT to secure the solutions by hand.

Need a hand updating your system against the CDPwn vulnerabilities? Or managing your organization’s patching responsibilities in general? Arraya Solutions can help. Our Managed Security team excels at working with customers to ensure their IT environments are patched and ready for whatever the threat landscape has in store. Visit https://www.arrayasolutions.com//contact-us/ to start a conversation with our team now.

We want to hear from you! Leave us a comment on this or any of our blog posts by way of social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}