cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
548
Views
1
Helpful
2
Replies

Non-Zero Padding Bytes Observed in Ethernet Packets DNAC

sujanyakj
Spotlight
Spotlight

We are having Gen 1  DNAC with IOS as 2.3.3.7 and during the vulnerability scan we got the below VA "Non-Zero Padding Bytes Observed in Ethernet Packets DNAC " with the resolution as " This weakness may be exploited to fingerprint the Ethernet cards and device drivers"

please suggest on the above

1 Accepted Solution

Accepted Solutions

Torbjørn
Spotlight
Spotlight

Is this the output from a third-party vulnerability assessment tool?

This describes exactly what it says, that this makes the device NICs and drivers is more likely to be identified(fingerprinted) by another device on the same L2 link/VLAN. Which could in theory be used to identify which vulnerabilities a device is susceptible to. As far as I can see this should be a non-issue for any well thought out DNAC deployment. The DNAC should not be placed in the same VLAN as any untrusted devices.

Happy to help! Please mark as helpful/solution if applicable.
Get in touch: https://torbjorn.dev

View solution in original post

2 Replies 2

Torbjørn
Spotlight
Spotlight

Is this the output from a third-party vulnerability assessment tool?

This describes exactly what it says, that this makes the device NICs and drivers is more likely to be identified(fingerprinted) by another device on the same L2 link/VLAN. Which could in theory be used to identify which vulnerabilities a device is susceptible to. As far as I can see this should be a non-issue for any well thought out DNAC deployment. The DNAC should not be placed in the same VLAN as any untrusted devices.

Happy to help! Please mark as helpful/solution if applicable.
Get in touch: https://torbjorn.dev

Thank you @Torbjørn. Yes , you are right. Scanner and device is in same subnet.