Lucene search

K
cveCiscoCVE-2024-20455
HistorySep 25, 2024 - 5:15 p.m.

CVE-2024-20455

2024-09-2517:15:16
CWE-371
cisco
web.nvd.nist.gov
22
cisco
ios xe
vulnerability
remote attacker
denial of service
utd
sd-wan
ipsec tunnel

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.6%

A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability.

Affected configurations

Vulners
Node
ciscocisco_ios_xe_softwareMatch17.1.1
OR
ciscocisco_ios_xe_softwareMatch17.1.1a
OR
ciscocisco_ios_xe_softwareMatch17.1.1s
OR
ciscocisco_ios_xe_softwareMatch17.1.1t
OR
ciscocisco_ios_xe_softwareMatch17.1.3
OR
ciscocisco_ios_xe_softwareMatch17.2.1
OR
ciscocisco_ios_xe_softwareMatch17.2.1r
OR
ciscocisco_ios_xe_softwareMatch17.2.1a
OR
ciscocisco_ios_xe_softwareMatch17.2.1v
OR
ciscocisco_ios_xe_softwareMatch17.2.2
OR
ciscocisco_ios_xe_softwareMatch17.2.3
OR
ciscocisco_ios_xe_softwareMatch17.3.1
OR
ciscocisco_ios_xe_softwareMatch17.3.2
OR
ciscocisco_ios_xe_softwareMatch17.3.3
OR
ciscocisco_ios_xe_softwareMatch17.3.1a
OR
ciscocisco_ios_xe_softwareMatch17.3.1w
OR
ciscocisco_ios_xe_softwareMatch17.3.2a
OR
ciscocisco_ios_xe_softwareMatch17.3.1x
OR
ciscocisco_ios_xe_softwareMatch17.3.1z
OR
ciscocisco_ios_xe_softwareMatch17.3.4
OR
ciscocisco_ios_xe_softwareMatch17.3.5
OR
ciscocisco_ios_xe_softwareMatch17.3.4a
OR
ciscocisco_ios_xe_softwareMatch17.3.6
OR
ciscocisco_ios_xe_softwareMatch17.3.4b
OR
ciscocisco_ios_xe_softwareMatch17.3.4c
OR
ciscocisco_ios_xe_softwareMatch17.3.5a
OR
ciscocisco_ios_xe_softwareMatch17.3.5b
OR
ciscocisco_ios_xe_softwareMatch17.3.7
OR
ciscocisco_ios_xe_softwareMatch17.3.8
OR
ciscocisco_ios_xe_softwareMatch17.3.8a
OR
ciscocisco_ios_xe_softwareMatch17.4.1
OR
ciscocisco_ios_xe_softwareMatch17.4.2
OR
ciscocisco_ios_xe_softwareMatch17.4.1a
OR
ciscocisco_ios_xe_softwareMatch17.4.1b
OR
ciscocisco_ios_xe_softwareMatch17.4.2a
OR
ciscocisco_ios_xe_softwareMatch17.5.1
OR
ciscocisco_ios_xe_softwareMatch17.5.1a
OR
ciscocisco_ios_xe_softwareMatch17.6.1
OR
ciscocisco_ios_xe_softwareMatch17.6.2
OR
ciscocisco_ios_xe_softwareMatch17.6.1w
OR
ciscocisco_ios_xe_softwareMatch17.6.1a
OR
ciscocisco_ios_xe_softwareMatch17.6.1x
OR
ciscocisco_ios_xe_softwareMatch17.6.3
OR
ciscocisco_ios_xe_softwareMatch17.6.1y
OR
ciscocisco_ios_xe_softwareMatch17.6.1z
OR
ciscocisco_ios_xe_softwareMatch17.6.3a
OR
ciscocisco_ios_xe_softwareMatch17.6.4
OR
ciscocisco_ios_xe_softwareMatch17.6.1z1
OR
ciscocisco_ios_xe_softwareMatch17.6.5
OR
ciscocisco_ios_xe_softwareMatch17.6.6
OR
ciscocisco_ios_xe_softwareMatch17.6.6a
OR
ciscocisco_ios_xe_softwareMatch17.6.5a
OR
ciscocisco_ios_xe_softwareMatch17.7.1
OR
ciscocisco_ios_xe_softwareMatch17.7.1a
OR
ciscocisco_ios_xe_softwareMatch17.7.1b
OR
ciscocisco_ios_xe_softwareMatch17.7.2
OR
ciscocisco_ios_xe_softwareMatch17.10.1
OR
ciscocisco_ios_xe_softwareMatch17.10.1a
OR
ciscocisco_ios_xe_softwareMatch17.10.1b
OR
ciscocisco_ios_xe_softwareMatch17.8.1
OR
ciscocisco_ios_xe_softwareMatch17.8.1a
OR
ciscocisco_ios_xe_softwareMatch17.9.1
OR
ciscocisco_ios_xe_softwareMatch17.9.1w
OR
ciscocisco_ios_xe_softwareMatch17.9.2
OR
ciscocisco_ios_xe_softwareMatch17.9.1a
OR
ciscocisco_ios_xe_softwareMatch17.9.1x
OR
ciscocisco_ios_xe_softwareMatch17.9.1y
OR
ciscocisco_ios_xe_softwareMatch17.9.3
OR
ciscocisco_ios_xe_softwareMatch17.9.2a
OR
ciscocisco_ios_xe_softwareMatch17.9.1x1
OR
ciscocisco_ios_xe_softwareMatch17.9.3a
OR
ciscocisco_ios_xe_softwareMatch17.9.4
OR
ciscocisco_ios_xe_softwareMatch17.9.1y1
OR
ciscocisco_ios_xe_softwareMatch17.9.5
OR
ciscocisco_ios_xe_softwareMatch17.9.4a
OR
ciscocisco_ios_xe_softwareMatch17.9.5a
OR
ciscocisco_ios_xe_softwareMatch17.9.5b
OR
ciscocisco_ios_xe_softwareMatch17.11.1
OR
ciscocisco_ios_xe_softwareMatch17.11.1a
OR
ciscocisco_ios_xe_softwareMatch17.12.1
OR
ciscocisco_ios_xe_softwareMatch17.12.1w
OR
ciscocisco_ios_xe_softwareMatch17.12.1a
OR
ciscocisco_ios_xe_softwareMatch17.12.2
OR
ciscocisco_ios_xe_softwareMatch17.12.2a
OR
ciscocisco_ios_xe_softwareMatch17.13.1
OR
ciscocisco_ios_xe_softwareMatch17.13.1a
OR
ciscocisco_ios_xe_softwareMatch17.11.99sw
OR
ciscoios_xe_sd-wanMatch17.5.1a
OR
ciscoios_xe_sd-wanMatch17.6.1a
OR
ciscoios_xe_sd-wanMatch17.6.2
OR
ciscoios_xe_sd-wanMatch17.6.4
OR
ciscoios_xe_sd-wanMatch17.7.1a
OR
ciscoios_xe_sd-wanMatch17.9.1a
OR
ciscoios_xe_sd-wanMatch17.9.2a
OR
ciscoios_xe_sd-wanMatch17.9.3a
OR
ciscoios_xe_sd-wanMatch17.9.4
OR
ciscoios_xe_sd-wanMatch17.8.1a
OR
ciscoios_xe_sd-wanMatch17.10.1a
OR
ciscoios_xe_sd-wanMatch17.11.1a
OR
ciscoios_xe_sd-wanMatch17.12.1a
OR
ciscoios_xe_sd-wanMatch17.13.1a
VendorProductVersionCPE
ciscocisco_ios_xe_software17.1.1cpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.1acpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1a:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.1scpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1s:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.1tcpe:2.3:a:cisco:cisco_ios_xe_software:17.1.1t:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.1.3cpe:2.3:a:cisco:cisco_ios_xe_software:17.1.3:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1rcpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1r:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1acpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1a:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.1vcpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1v:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.2.2cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 1011

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software",
    "versions": [
      {
        "version": "17.1.1",
        "status": "affected"
      },
      {
        "version": "17.1.1a",
        "status": "affected"
      },
      {
        "version": "17.1.1s",
        "status": "affected"
      },
      {
        "version": "17.1.1t",
        "status": "affected"
      },
      {
        "version": "17.1.3",
        "status": "affected"
      },
      {
        "version": "17.2.1",
        "status": "affected"
      },
      {
        "version": "17.2.1r",
        "status": "affected"
      },
      {
        "version": "17.2.1a",
        "status": "affected"
      },
      {
        "version": "17.2.1v",
        "status": "affected"
      },
      {
        "version": "17.2.2",
        "status": "affected"
      },
      {
        "version": "17.2.3",
        "status": "affected"
      },
      {
        "version": "17.3.1",
        "status": "affected"
      },
      {
        "version": "17.3.2",
        "status": "affected"
      },
      {
        "version": "17.3.3",
        "status": "affected"
      },
      {
        "version": "17.3.1a",
        "status": "affected"
      },
      {
        "version": "17.3.1w",
        "status": "affected"
      },
      {
        "version": "17.3.2a",
        "status": "affected"
      },
      {
        "version": "17.3.1x",
        "status": "affected"
      },
      {
        "version": "17.3.1z",
        "status": "affected"
      },
      {
        "version": "17.3.4",
        "status": "affected"
      },
      {
        "version": "17.3.5",
        "status": "affected"
      },
      {
        "version": "17.3.4a",
        "status": "affected"
      },
      {
        "version": "17.3.6",
        "status": "affected"
      },
      {
        "version": "17.3.4b",
        "status": "affected"
      },
      {
        "version": "17.3.4c",
        "status": "affected"
      },
      {
        "version": "17.3.5a",
        "status": "affected"
      },
      {
        "version": "17.3.5b",
        "status": "affected"
      },
      {
        "version": "17.3.7",
        "status": "affected"
      },
      {
        "version": "17.3.8",
        "status": "affected"
      },
      {
        "version": "17.3.8a",
        "status": "affected"
      },
      {
        "version": "17.4.1",
        "status": "affected"
      },
      {
        "version": "17.4.2",
        "status": "affected"
      },
      {
        "version": "17.4.1a",
        "status": "affected"
      },
      {
        "version": "17.4.1b",
        "status": "affected"
      },
      {
        "version": "17.4.2a",
        "status": "affected"
      },
      {
        "version": "17.5.1",
        "status": "affected"
      },
      {
        "version": "17.5.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1",
        "status": "affected"
      },
      {
        "version": "17.6.2",
        "status": "affected"
      },
      {
        "version": "17.6.1w",
        "status": "affected"
      },
      {
        "version": "17.6.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1x",
        "status": "affected"
      },
      {
        "version": "17.6.3",
        "status": "affected"
      },
      {
        "version": "17.6.1y",
        "status": "affected"
      },
      {
        "version": "17.6.1z",
        "status": "affected"
      },
      {
        "version": "17.6.3a",
        "status": "affected"
      },
      {
        "version": "17.6.4",
        "status": "affected"
      },
      {
        "version": "17.6.1z1",
        "status": "affected"
      },
      {
        "version": "17.6.5",
        "status": "affected"
      },
      {
        "version": "17.6.6",
        "status": "affected"
      },
      {
        "version": "17.6.6a",
        "status": "affected"
      },
      {
        "version": "17.6.5a",
        "status": "affected"
      },
      {
        "version": "17.7.1",
        "status": "affected"
      },
      {
        "version": "17.7.1a",
        "status": "affected"
      },
      {
        "version": "17.7.1b",
        "status": "affected"
      },
      {
        "version": "17.7.2",
        "status": "affected"
      },
      {
        "version": "17.10.1",
        "status": "affected"
      },
      {
        "version": "17.10.1a",
        "status": "affected"
      },
      {
        "version": "17.10.1b",
        "status": "affected"
      },
      {
        "version": "17.8.1",
        "status": "affected"
      },
      {
        "version": "17.8.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1",
        "status": "affected"
      },
      {
        "version": "17.9.1w",
        "status": "affected"
      },
      {
        "version": "17.9.2",
        "status": "affected"
      },
      {
        "version": "17.9.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1x",
        "status": "affected"
      },
      {
        "version": "17.9.1y",
        "status": "affected"
      },
      {
        "version": "17.9.3",
        "status": "affected"
      },
      {
        "version": "17.9.2a",
        "status": "affected"
      },
      {
        "version": "17.9.1x1",
        "status": "affected"
      },
      {
        "version": "17.9.3a",
        "status": "affected"
      },
      {
        "version": "17.9.4",
        "status": "affected"
      },
      {
        "version": "17.9.1y1",
        "status": "affected"
      },
      {
        "version": "17.9.5",
        "status": "affected"
      },
      {
        "version": "17.9.4a",
        "status": "affected"
      },
      {
        "version": "17.9.5a",
        "status": "affected"
      },
      {
        "version": "17.9.5b",
        "status": "affected"
      },
      {
        "version": "17.11.1",
        "status": "affected"
      },
      {
        "version": "17.11.1a",
        "status": "affected"
      },
      {
        "version": "17.12.1",
        "status": "affected"
      },
      {
        "version": "17.12.1w",
        "status": "affected"
      },
      {
        "version": "17.12.1a",
        "status": "affected"
      },
      {
        "version": "17.12.2",
        "status": "affected"
      },
      {
        "version": "17.12.2a",
        "status": "affected"
      },
      {
        "version": "17.13.1",
        "status": "affected"
      },
      {
        "version": "17.13.1a",
        "status": "affected"
      },
      {
        "version": "17.11.99SW",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Catalyst SD-WAN",
    "versions": [
      {
        "version": "17.5.1a",
        "status": "affected"
      },
      {
        "version": "17.6.1a",
        "status": "affected"
      },
      {
        "version": "17.6.2",
        "status": "affected"
      },
      {
        "version": "17.6.4",
        "status": "affected"
      },
      {
        "version": "17.7.1a",
        "status": "affected"
      },
      {
        "version": "17.9.1a",
        "status": "affected"
      },
      {
        "version": "17.9.2a",
        "status": "affected"
      },
      {
        "version": "17.9.3a",
        "status": "affected"
      },
      {
        "version": "17.9.4",
        "status": "affected"
      },
      {
        "version": "17.8.1a",
        "status": "affected"
      },
      {
        "version": "17.10.1a",
        "status": "affected"
      },
      {
        "version": "17.11.1a",
        "status": "affected"
      },
      {
        "version": "17.12.1a",
        "status": "affected"
      },
      {
        "version": "17.13.1a",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.6%

Related for CVE-2024-20455