Open In App

What are CDP (Cisco Discovery Protocol) Attacks?

CDP is a Layer 2 protocol used by Cisco devices; it is used for discovering other directly connected Cisco devices in a network, This allows devices to auto-configure their connections hence it simplifies connectivity and configuration.

Generally, CDP is enabled on most Cisco devices. As routers don’t circulate it, the CDP data is transmitted through periodic broadcasts that are maintained locally in the cisco device CDP table.



CDP database is comprised of a lot of data about the device such as capabilities, IP address, native VLAN, software version, platform version, etc. And when all this information gets in the hand of a malicious user through a compromised system, they can use this information to find exploits for attacking the network. Generally carried out as a DoS attack.  A malicious user can also make counterfeit CDP packets and forward them to other devices as CDP is not authenticated.

Possible Attacks:

Preventions Against CDP Attacks:

The following points can be considered for preventing CDP attacks.



Detection:

Changes in CDP can be monitored with the help of a CDP monitor, this CDP program helps in discovering CDP changes on the network; it can inform the user by prompting a message box and can also send warning emails. As it is possible to send custom CDP packets from the CDP monitor thus, it can also be helpful in CDP spoofing attacks.       

Article Tags :