CVE-2024-20311

A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note: This vulnerability could be exploited over either IPv4 or IPv6 transport.
Configurations

No configuration.

History

21 Nov 2024, 08:52

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP -
Summary
  • (es) Una vulnerabilidad en la función del Protocolo de separación de ID del localizador (LISP) del software Cisco IOS y del software Cisco IOS XE podría permitir que un atacante remoto no autenticado provoque la recarga de un dispositivo afectado. Esta vulnerabilidad se debe al manejo incorrecto de los paquetes LISP. Un atacante podría aprovechar esta vulnerabilidad enviando un paquete LISP manipulado a un dispositivo afectado. Un exploit exitoso podría permitir al atacante hacer que el dispositivo se recargue, lo que resultaría en una condición de denegación de servicio (DoS). Nota: Esta vulnerabilidad podría explotarse mediante transporte IPv4 o IPv6.

27 Mar 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 17:15

Updated : 2024-11-21 08:52


NVD link : CVE-2024-20311

Mitre link : CVE-2024-20311

CVE.ORG link : CVE-2024-20311


JSON object : View

Products Affected

No product.

CWE
CWE-674

Uncontrolled Recursion