A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one.
References
Configurations
No configuration.
History
21 Nov 2024, 08:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z - |
27 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-27 17:15
Updated : 2024-11-21 08:52
NVD link : CVE-2024-20259
Mitre link : CVE-2024-20259
CVE.ORG link : CVE-2024-20259
JSON object : View
Products Affected
No product.
CWE
CWE-122
Heap-based Buffer Overflow