01-08-2024 10:07 PM
We are having Gen 1 DNAC with IOS as 2.3.3.7 and during the vulnerability scan we got the below VA "Non-Zero Padding Bytes Observed in Ethernet Packets DNAC " with the resolution as " This weakness may be exploited to fingerprint the Ethernet cards and device drivers"
please suggest on the above
Solved! Go to Solution.
01-09-2024 12:26 AM
Is this the output from a third-party vulnerability assessment tool?
This describes exactly what it says, that this makes the device NICs and drivers is more likely to be identified(fingerprinted) by another device on the same L2 link/VLAN. Which could in theory be used to identify which vulnerabilities a device is susceptible to. As far as I can see this should be a non-issue for any well thought out DNAC deployment. The DNAC should not be placed in the same VLAN as any untrusted devices.
01-09-2024 12:26 AM
Is this the output from a third-party vulnerability assessment tool?
This describes exactly what it says, that this makes the device NICs and drivers is more likely to be identified(fingerprinted) by another device on the same L2 link/VLAN. Which could in theory be used to identify which vulnerabilities a device is susceptible to. As far as I can see this should be a non-issue for any well thought out DNAC deployment. The DNAC should not be placed in the same VLAN as any untrusted devices.
01-11-2024 01:45 AM
Thank you @Torbjørn. Yes , you are right. Scanner and device is in same subnet.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide