Lucene search

K
cvelistCiscoCVELIST:CVE-2024-20390
HistorySep 11, 2024 - 4:38 p.m.

CVE-2024-20390 Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability

2024-09-1116:38:15
cisco
www.cve.org
2
cisco
ios xr
software
dos
vulnerability
xml
tcp
port
38751
remote
attacker
ingress
packets
crafted
stream
traffic

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0

Percentile

9.6%

A vulnerability in the Dedicated XML Agent feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on XML TCP listen port 38751.

This vulnerability is due to a lack of proper error validation of ingress XML packets. An attacker could exploit this vulnerability by sending a sustained, crafted stream of XML traffic to a targeted device. A successful exploit could allow the attacker to cause XML TCP port 38751 to become unreachable while the attack traffic persists.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XR Software",
    "versions": [
      {
        "version": "6.5.3",
        "status": "affected"
      },
      {
        "version": "6.5.29",
        "status": "affected"
      },
      {
        "version": "6.5.1",
        "status": "affected"
      },
      {
        "version": "6.6.1",
        "status": "affected"
      },
      {
        "version": "6.5.2",
        "status": "affected"
      },
      {
        "version": "6.5.92",
        "status": "affected"
      },
      {
        "version": "6.5.15",
        "status": "affected"
      },
      {
        "version": "6.6.2",
        "status": "affected"
      },
      {
        "version": "7.0.1",
        "status": "affected"
      },
      {
        "version": "6.6.25",
        "status": "affected"
      },
      {
        "version": "6.5.26",
        "status": "affected"
      },
      {
        "version": "6.6.11",
        "status": "affected"
      },
      {
        "version": "6.5.25",
        "status": "affected"
      },
      {
        "version": "6.5.28",
        "status": "affected"
      },
      {
        "version": "6.5.93",
        "status": "affected"
      },
      {
        "version": "6.6.12",
        "status": "affected"
      },
      {
        "version": "6.5.90",
        "status": "affected"
      },
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "version": "7.1.1",
        "status": "affected"
      },
      {
        "version": "7.0.90",
        "status": "affected"
      },
      {
        "version": "6.6.3",
        "status": "affected"
      },
      {
        "version": "6.7.1",
        "status": "affected"
      },
      {
        "version": "7.0.2",
        "status": "affected"
      },
      {
        "version": "7.1.15",
        "status": "affected"
      },
      {
        "version": "7.2.0",
        "status": "affected"
      },
      {
        "version": "7.2.1",
        "status": "affected"
      },
      {
        "version": "7.1.2",
        "status": "affected"
      },
      {
        "version": "6.7.2",
        "status": "affected"
      },
      {
        "version": "7.0.11",
        "status": "affected"
      },
      {
        "version": "7.0.12",
        "status": "affected"
      },
      {
        "version": "7.0.14",
        "status": "affected"
      },
      {
        "version": "7.1.25",
        "status": "affected"
      },
      {
        "version": "6.6.4",
        "status": "affected"
      },
      {
        "version": "7.2.12",
        "status": "affected"
      },
      {
        "version": "7.3.1",
        "status": "affected"
      },
      {
        "version": "7.1.3",
        "status": "affected"
      },
      {
        "version": "6.7.3",
        "status": "affected"
      },
      {
        "version": "7.4.1",
        "status": "affected"
      },
      {
        "version": "7.2.2",
        "status": "affected"
      },
      {
        "version": "6.7.4",
        "status": "affected"
      },
      {
        "version": "6.5.31",
        "status": "affected"
      },
      {
        "version": "7.3.15",
        "status": "affected"
      },
      {
        "version": "7.3.16",
        "status": "affected"
      },
      {
        "version": "6.8.1",
        "status": "affected"
      },
      {
        "version": "7.4.15",
        "status": "affected"
      },
      {
        "version": "6.5.32",
        "status": "affected"
      },
      {
        "version": "7.3.2",
        "status": "affected"
      },
      {
        "version": "7.5.1",
        "status": "affected"
      },
      {
        "version": "7.4.16",
        "status": "affected"
      },
      {
        "version": "7.3.27",
        "status": "affected"
      },
      {
        "version": "7.6.1",
        "status": "affected"
      },
      {
        "version": "7.5.2",
        "status": "affected"
      },
      {
        "version": "7.8.1",
        "status": "affected"
      },
      {
        "version": "7.6.15",
        "status": "affected"
      },
      {
        "version": "7.5.12",
        "status": "affected"
      },
      {
        "version": "7.8.12",
        "status": "affected"
      },
      {
        "version": "7.3.3",
        "status": "affected"
      },
      {
        "version": "7.7.1",
        "status": "affected"
      },
      {
        "version": "6.8.2",
        "status": "affected"
      },
      {
        "version": "7.3.4",
        "status": "affected"
      },
      {
        "version": "7.4.2",
        "status": "affected"
      },
      {
        "version": "6.7.35",
        "status": "affected"
      },
      {
        "version": "6.9.1",
        "status": "affected"
      },
      {
        "version": "7.6.2",
        "status": "affected"
      },
      {
        "version": "7.5.3",
        "status": "affected"
      },
      {
        "version": "7.7.2",
        "status": "affected"
      },
      {
        "version": "6.9.2",
        "status": "affected"
      },
      {
        "version": "7.9.1",
        "status": "affected"
      },
      {
        "version": "7.10.1",
        "status": "affected"
      },
      {
        "version": "7.8.2",
        "status": "affected"
      },
      {
        "version": "7.5.4",
        "status": "affected"
      },
      {
        "version": "6.5.33",
        "status": "affected"
      },
      {
        "version": "7.8.22",
        "status": "affected"
      },
      {
        "version": "7.7.21",
        "status": "affected"
      },
      {
        "version": "7.9.2",
        "status": "affected"
      },
      {
        "version": "7.3.5",
        "status": "affected"
      },
      {
        "version": "7.5.5",
        "status": "affected"
      },
      {
        "version": "7.11.1",
        "status": "affected"
      },
      {
        "version": "7.9.21",
        "status": "affected"
      },
      {
        "version": "7.10.2",
        "status": "affected"
      },
      {
        "version": "24.1.1",
        "status": "affected"
      },
      {
        "version": "7.6.3",
        "status": "affected"
      },
      {
        "version": "7.3.6",
        "status": "affected"
      },
      {
        "version": "7.5.52",
        "status": "affected"
      },
      {
        "version": "7.11.2",
        "status": "affected"
      },
      {
        "version": "24.2.1",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0

Percentile

9.6%

Related for CVELIST:CVE-2024-20390