Lucene search

K
cve[email protected]CVE-2024-20313
HistoryApr 24, 2024 - 9:15 p.m.

CVE-2024-20313

2024-04-2421:15:46
CWE-120
web.nvd.nist.gov
55
cve-2024-20313
organization
individual
security problem
publicized
details
nvd

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

A vulnerability in the OSPF version 2 (OSPFv2) feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of OSPF updates that are processed by a device. An attacker could exploit this vulnerability by sending a malformed OSPF update to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Affected configurations

NVD
Node
ciscoios_xeMatch17.5.1
OR
ciscoios_xeMatch17.5.1a
OR
ciscoios_xeMatch17.6.1
OR
ciscoios_xeMatch17.6.1a
OR
ciscoios_xeMatch17.6.1w
OR
ciscoios_xeMatch17.6.1x
OR
ciscoios_xeMatch17.6.1y
OR
ciscoios_xeMatch17.6.1z
OR
ciscoios_xeMatch17.6.1z1
OR
ciscoios_xeMatch17.6.2
OR
ciscoios_xeMatch17.6.3
OR
ciscoios_xeMatch17.6.3a
OR
ciscoios_xeMatch17.6.4
OR
ciscoios_xeMatch17.6.5
OR
ciscoios_xeMatch17.6.5a
OR
ciscoios_xeMatch17.7.1
OR
ciscoios_xeMatch17.7.1a
OR
ciscoios_xeMatch17.7.1b
OR
ciscoios_xeMatch17.7.2
OR
ciscoios_xeMatch17.8.1
OR
ciscoios_xeMatch17.8.1a
OR
ciscoios_xeMatch17.9.1
OR
ciscoios_xeMatch17.9.1a
OR
ciscoios_xeMatch17.9.1w
OR
ciscoios_xeMatch17.9.1x
OR
ciscoios_xeMatch17.9.1x1
OR
ciscoios_xeMatch17.9.1y
OR
ciscoios_xeMatch17.9.1y1
OR
ciscoios_xeMatch17.9.2
OR
ciscoios_xeMatch17.9.2a
OR
ciscoios_xeMatch17.9.3
OR
ciscoios_xeMatch17.9.3a
OR
ciscoios_xeMatch17.10.1
OR
ciscoios_xeMatch17.10.1a
OR
ciscoios_xeMatch17.10.1b
OR
ciscoios_xeMatch17.11.1
OR
ciscoios_xeMatch17.11.1a
OR
ciscoios_xeMatch17.11.99sw

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software",
    "versions": [
      {
        "version": "17.5.1",
        "status": "affected"
      },
      {
        "version": "17.5.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1",
        "status": "affected"
      },
      {
        "version": "17.6.2",
        "status": "affected"
      },
      {
        "version": "17.6.1w",
        "status": "affected"
      },
      {
        "version": "17.6.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1x",
        "status": "affected"
      },
      {
        "version": "17.6.3",
        "status": "affected"
      },
      {
        "version": "17.6.1y",
        "status": "affected"
      },
      {
        "version": "17.6.1z",
        "status": "affected"
      },
      {
        "version": "17.6.3a",
        "status": "affected"
      },
      {
        "version": "17.6.4",
        "status": "affected"
      },
      {
        "version": "17.6.1z1",
        "status": "affected"
      },
      {
        "version": "17.6.5",
        "status": "affected"
      },
      {
        "version": "17.6.5a",
        "status": "affected"
      },
      {
        "version": "17.7.1",
        "status": "affected"
      },
      {
        "version": "17.7.1a",
        "status": "affected"
      },
      {
        "version": "17.7.1b",
        "status": "affected"
      },
      {
        "version": "17.7.2",
        "status": "affected"
      },
      {
        "version": "17.10.1",
        "status": "affected"
      },
      {
        "version": "17.10.1a",
        "status": "affected"
      },
      {
        "version": "17.10.1b",
        "status": "affected"
      },
      {
        "version": "17.8.1",
        "status": "affected"
      },
      {
        "version": "17.8.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1",
        "status": "affected"
      },
      {
        "version": "17.9.1w",
        "status": "affected"
      },
      {
        "version": "17.9.2",
        "status": "affected"
      },
      {
        "version": "17.9.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1x",
        "status": "affected"
      },
      {
        "version": "17.9.1y",
        "status": "affected"
      },
      {
        "version": "17.9.3",
        "status": "affected"
      },
      {
        "version": "17.9.2a",
        "status": "affected"
      },
      {
        "version": "17.9.1x1",
        "status": "affected"
      },
      {
        "version": "17.9.3a",
        "status": "affected"
      },
      {
        "version": "17.9.1y1",
        "status": "affected"
      },
      {
        "version": "17.11.1",
        "status": "affected"
      },
      {
        "version": "17.11.1a",
        "status": "affected"
      },
      {
        "version": "17.11.99SW",
        "status": "affected"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

Related for CVE-2024-20313