Lucene search

K
cveCiscoCVE-2024-20259
HistoryMar 27, 2024 - 5:15 p.m.

CVE-2024-20259

2024-03-2717:15:50
CWE-122
cisco
web.nvd.nist.gov
39
cisco ios xe
dhcp snooping
remote attack
denial of service
crafted packet
network vector

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.

This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one.

Affected configurations

Vulners
Node
ciscocisco_ios_xe_softwareMatch17.1.1
OR
ciscocisco_ios_xe_softwareMatch17.1.1a
OR
ciscocisco_ios_xe_softwareMatch17.1.1s
OR
ciscocisco_ios_xe_softwareMatch17.1.1t
OR
ciscocisco_ios_xe_softwareMatch17.1.3
OR
ciscocisco_ios_xe_softwareMatch17.2.1
OR
ciscocisco_ios_xe_softwareMatch17.2.1r
OR
ciscocisco_ios_xe_softwareMatch17.2.1a
OR
ciscocisco_ios_xe_softwareMatch17.2.1v
OR
ciscocisco_ios_xe_softwareMatch17.2.2
OR
ciscocisco_ios_xe_softwareMatch17.2.3
OR
ciscocisco_ios_xe_softwareMatch17.3.1
OR
ciscocisco_ios_xe_softwareMatch17.3.2
OR
ciscocisco_ios_xe_softwareMatch17.3.3
OR
ciscocisco_ios_xe_softwareMatch17.3.1a
OR
ciscocisco_ios_xe_softwareMatch17.3.1w
OR
ciscocisco_ios_xe_softwareMatch17.3.2a
OR
ciscocisco_ios_xe_softwareMatch17.3.1x
OR
ciscocisco_ios_xe_softwareMatch17.3.1z
OR
ciscocisco_ios_xe_softwareMatch17.3.4
OR
ciscocisco_ios_xe_softwareMatch17.3.5
OR
ciscocisco_ios_xe_softwareMatch17.3.4a
OR
ciscocisco_ios_xe_softwareMatch17.3.6
OR
ciscocisco_ios_xe_softwareMatch17.3.4b
OR
ciscocisco_ios_xe_softwareMatch17.3.4c
OR
ciscocisco_ios_xe_softwareMatch17.3.5a
OR
ciscocisco_ios_xe_softwareMatch17.3.5b
OR
ciscocisco_ios_xe_softwareMatch17.3.7
OR
ciscocisco_ios_xe_softwareMatch17.3.8
OR
ciscocisco_ios_xe_softwareMatch17.3.8a
OR
ciscocisco_ios_xe_softwareMatch17.4.1
OR
ciscocisco_ios_xe_softwareMatch17.4.2
OR
ciscocisco_ios_xe_softwareMatch17.4.1a
OR
ciscocisco_ios_xe_softwareMatch17.4.1b
OR
ciscocisco_ios_xe_softwareMatch17.4.2a
OR
ciscocisco_ios_xe_softwareMatch17.5.1
OR
ciscocisco_ios_xe_softwareMatch17.5.1a
OR
ciscocisco_ios_xe_softwareMatch17.6.1
OR
ciscocisco_ios_xe_softwareMatch17.6.2
OR
ciscocisco_ios_xe_softwareMatch17.6.1w
OR
ciscocisco_ios_xe_softwareMatch17.6.1a
OR
ciscocisco_ios_xe_softwareMatch17.6.1x
OR
ciscocisco_ios_xe_softwareMatch17.6.3
OR
ciscocisco_ios_xe_softwareMatch17.6.1y
OR
ciscocisco_ios_xe_softwareMatch17.6.1z
OR
ciscocisco_ios_xe_softwareMatch17.6.3a
OR
ciscocisco_ios_xe_softwareMatch17.6.4
OR
ciscocisco_ios_xe_softwareMatch17.6.1z1
OR
ciscocisco_ios_xe_softwareMatch17.6.5
OR
ciscocisco_ios_xe_softwareMatch17.6.6
OR
ciscocisco_ios_xe_softwareMatch17.6.6a
OR
ciscocisco_ios_xe_softwareMatch17.6.5a
OR
ciscocisco_ios_xe_softwareMatch17.7.1
OR
ciscocisco_ios_xe_softwareMatch17.7.1a
OR
ciscocisco_ios_xe_softwareMatch17.7.1b
OR
ciscocisco_ios_xe_softwareMatch17.7.2
OR
ciscocisco_ios_xe_softwareMatch17.10.1
OR
ciscocisco_ios_xe_softwareMatch17.10.1a
OR
ciscocisco_ios_xe_softwareMatch17.10.1b
OR
ciscocisco_ios_xe_softwareMatch17.8.1
OR
ciscocisco_ios_xe_softwareMatch17.8.1a
OR
ciscocisco_ios_xe_softwareMatch17.9.1
OR
ciscocisco_ios_xe_softwareMatch17.9.1w
OR
ciscocisco_ios_xe_softwareMatch17.9.2
OR
ciscocisco_ios_xe_softwareMatch17.9.1a
OR
ciscocisco_ios_xe_softwareMatch17.9.1x
OR
ciscocisco_ios_xe_softwareMatch17.9.1y
OR
ciscocisco_ios_xe_softwareMatch17.9.3
OR
ciscocisco_ios_xe_softwareMatch17.9.2a
OR
ciscocisco_ios_xe_softwareMatch17.9.1x1
OR
ciscocisco_ios_xe_softwareMatch17.9.3a
OR
ciscocisco_ios_xe_softwareMatch17.9.4
OR
ciscocisco_ios_xe_softwareMatch17.9.1y1
OR
ciscocisco_ios_xe_softwareMatch17.9.4a
OR
ciscocisco_ios_xe_softwareMatch17.11.1
OR
ciscocisco_ios_xe_softwareMatch17.11.1a
OR
ciscocisco_ios_xe_softwareMatch17.12.1
OR
ciscocisco_ios_xe_softwareMatch17.12.1w
OR
ciscocisco_ios_xe_softwareMatch17.12.1a
OR
ciscocisco_ios_xe_softwareMatch17.11.99sw
VendorProductVersionCPE
ciscocisco_ios_xe_software17.1.1cpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.1acpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1a:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.1scpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1s:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.1tcpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1t:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.3cpe:2.3:a:cisco:cisco_ios_xe_software:17.1.3:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1rcpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1r:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1acpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1a:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1vcpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1v:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.2cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 801

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software",
    "versions": [
      {
        "version": "17.1.1",
        "status": "affected"
      },
      {
        "version": "17.1.1a",
        "status": "affected"
      },
      {
        "version": "17.1.1s",
        "status": "affected"
      },
      {
        "version": "17.1.1t",
        "status": "affected"
      },
      {
        "version": "17.1.3",
        "status": "affected"
      },
      {
        "version": "17.2.1",
        "status": "affected"
      },
      {
        "version": "17.2.1r",
        "status": "affected"
      },
      {
        "version": "17.2.1a",
        "status": "affected"
      },
      {
        "version": "17.2.1v",
        "status": "affected"
      },
      {
        "version": "17.2.2",
        "status": "affected"
      },
      {
        "version": "17.2.3",
        "status": "affected"
      },
      {
        "version": "17.3.1",
        "status": "affected"
      },
      {
        "version": "17.3.2",
        "status": "affected"
      },
      {
        "version": "17.3.3",
        "status": "affected"
      },
      {
        "version": "17.3.1a",
        "status": "affected"
      },
      {
        "version": "17.3.1w",
        "status": "affected"
      },
      {
        "version": "17.3.2a",
        "status": "affected"
      },
      {
        "version": "17.3.1x",
        "status": "affected"
      },
      {
        "version": "17.3.1z",
        "status": "affected"
      },
      {
        "version": "17.3.4",
        "status": "affected"
      },
      {
        "version": "17.3.5",
        "status": "affected"
      },
      {
        "version": "17.3.4a",
        "status": "affected"
      },
      {
        "version": "17.3.6",
        "status": "affected"
      },
      {
        "version": "17.3.4b",
        "status": "affected"
      },
      {
        "version": "17.3.4c",
        "status": "affected"
      },
      {
        "version": "17.3.5a",
        "status": "affected"
      },
      {
        "version": "17.3.5b",
        "status": "affected"
      },
      {
        "version": "17.3.7",
        "status": "affected"
      },
      {
        "version": "17.3.8",
        "status": "affected"
      },
      {
        "version": "17.3.8a",
        "status": "affected"
      },
      {
        "version": "17.4.1",
        "status": "affected"
      },
      {
        "version": "17.4.2",
        "status": "affected"
      },
      {
        "version": "17.4.1a",
        "status": "affected"
      },
      {
        "version": "17.4.1b",
        "status": "affected"
      },
      {
        "version": "17.4.2a",
        "status": "affected"
      },
      {
        "version": "17.5.1",
        "status": "affected"
      },
      {
        "version": "17.5.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1",
        "status": "affected"
      },
      {
        "version": "17.6.2",
        "status": "affected"
      },
      {
        "version": "17.6.1w",
        "status": "affected"
      },
      {
        "version": "17.6.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1x",
        "status": "affected"
      },
      {
        "version": "17.6.3",
        "status": "affected"
      },
      {
        "version": "17.6.1y",
        "status": "affected"
      },
      {
        "version": "17.6.1z",
        "status": "affected"
      },
      {
        "version": "17.6.3a",
        "status": "affected"
      },
      {
        "version": "17.6.4",
        "status": "affected"
      },
      {
        "version": "17.6.1z1",
        "status": "affected"
      },
      {
        "version": "17.6.5",
        "status": "affected"
      },
      {
        "version": "17.6.6",
        "status": "affected"
      },
      {
        "version": "17.6.6a",
        "status": "affected"
      },
      {
        "version": "17.6.5a",
        "status": "affected"
      },
      {
        "version": "17.7.1",
        "status": "affected"
      },
      {
        "version": "17.7.1a",
        "status": "affected"
      },
      {
        "version": "17.7.1b",
        "status": "affected"
      },
      {
        "version": "17.7.2",
        "status": "affected"
      },
      {
        "version": "17.10.1",
        "status": "affected"
      },
      {
        "version": "17.10.1a",
        "status": "affected"
      },
      {
        "version": "17.10.1b",
        "status": "affected"
      },
      {
        "version": "17.8.1",
        "status": "affected"
      },
      {
        "version": "17.8.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1",
        "status": "affected"
      },
      {
        "version": "17.9.1w",
        "status": "affected"
      },
      {
        "version": "17.9.2",
        "status": "affected"
      },
      {
        "version": "17.9.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1x",
        "status": "affected"
      },
      {
        "version": "17.9.1y",
        "status": "affected"
      },
      {
        "version": "17.9.3",
        "status": "affected"
      },
      {
        "version": "17.9.2a",
        "status": "affected"
      },
      {
        "version": "17.9.1x1",
        "status": "affected"
      },
      {
        "version": "17.9.3a",
        "status": "affected"
      },
      {
        "version": "17.9.4",
        "status": "affected"
      },
      {
        "version": "17.9.1y1",
        "status": "affected"
      },
      {
        "version": "17.9.4a",
        "status": "affected"
      },
      {
        "version": "17.11.1",
        "status": "affected"
      },
      {
        "version": "17.11.1a",
        "status": "affected"
      },
      {
        "version": "17.12.1",
        "status": "affected"
      },
      {
        "version": "17.12.1w",
        "status": "affected"
      },
      {
        "version": "17.12.1a",
        "status": "affected"
      },
      {
        "version": "17.11.99SW",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVE-2024-20259