CVE-2024-20276

A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Configurations

No configuration.

History

21 Nov 2024, 08:52

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG -
Summary
  • (es) Una vulnerabilidad en el software Cisco IOS para los conmutadores Cisco Catalyst serie 6000 podría permitir que un atacante adyacente no autenticado provoque que un dispositivo afectado se recargue inesperadamente. Esta vulnerabilidad se debe a un manejo inadecuado del tráfico de conmutación de procesos. Un atacante podría aprovechar esta vulnerabilidad enviando tráfico manipulado a un dispositivo afectado. Un exploit exitoso podría permitir al atacante hacer que el dispositivo afectado se recargue, lo que resultaría en una condición de denegación de servicio (DoS).

27 Mar 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 17:15

Updated : 2024-11-21 08:52


NVD link : CVE-2024-20276

Mitre link : CVE-2024-20276

CVE.ORG link : CVE-2024-20276


JSON object : View

Products Affected

No product.

CWE
CWE-248

Uncaught Exception