Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20373
HistoryNov 15, 2024 - 2:52 p.m.

CVE-2024-20373 Cisco IOS and Cisco IOS XE SNMP Extended ACL Bypass Vulnerability

2024-11-1514:52:34
cisco
github.com
1
cisco
snmp
vulnerability
access control list
ipv4
remote attacker
exploit
acl bypass

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.3

Confidence

Low

EPSS

0.001

Percentile

18.4%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic. 

This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.
SNMP with IPv6 ACL configurations is not affected.
For more information, see the section of this advisory.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3a:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.3b:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.10.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1a:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1b:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1d:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1f:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.11.1s:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.12.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:ios_xe_catalyst_sd-wan:16.9.3:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "ios_xe_catalyst_sd-wan",
    "versions": [
      {
        "status": "affected",
        "version": "16.10.1"
      },
      {
        "status": "affected",
        "version": "16.10.2"
      },
      {
        "status": "affected",
        "version": "16.10.3"
      },
      {
        "status": "affected",
        "version": "16.10.3a"
      },
      {
        "status": "affected",
        "version": "16.10.3b"
      },
      {
        "status": "affected",
        "version": "16.10.4"
      },
      {
        "status": "affected",
        "version": "16.10.5"
      },
      {
        "status": "affected",
        "version": "16.10.6"
      },
      {
        "status": "affected",
        "version": "16.11.1"
      },
      {
        "status": "affected",
        "version": "16.11.1a"
      },
      {
        "status": "affected",
        "version": "16.11.1b"
      },
      {
        "status": "affected",
        "version": "16.11.1d"
      },
      {
        "status": "affected",
        "version": "16.11.1f"
      },
      {
        "status": "affected",
        "version": "16.11.1s"
      },
      {
        "status": "affected",
        "version": "16.12.1"
      },
      {
        "status": "affected",
        "version": "16.12.3"
      },
      {
        "status": "affected",
        "version": "16.12.4"
      },
      {
        "status": "affected",
        "version": "16.12.5"
      },
      {
        "status": "affected",
        "version": "16.9.3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.3

Confidence

Low

EPSS

0.001

Percentile

18.4%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-20373