Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-20304


A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device. This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition. Note: This vulnerability can be exploited using IPv4 or IPv6.


Published

2024-09-11T17:15:11.853

Last Modified

2024-10-03T14:20:07.680

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.6 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-401
  • Type: Primary
    CWE-401

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios_xr 7.7.1 Yes
Operating System cisco ios_xr 7.7.2 Yes
Operating System cisco ios_xr 7.7.21 Yes
Operating System cisco ios_xr 7.8.1 Yes
Operating System cisco ios_xr 7.8.2 Yes
Operating System cisco ios_xr 7.8.12 Yes
Operating System cisco ios_xr 7.8.22 Yes
Operating System cisco ios_xr 7.9.1 Yes
Operating System cisco ios_xr 7.9.2 Yes
Operating System cisco ios_xr 7.9.21 Yes
Operating System cisco ios_xr 7.10.1 Yes
Operating System cisco ios_xr 7.10.2 Yes
Operating System cisco ios_xr 7.11.1 Yes
Operating System cisco ios_xr 7.11.2 Yes
Operating System cisco ios_xr 24.1.1 Yes
Operating System cisco ios_xr 24.1.2 Yes
Operating System cisco ios_xr 24.2.1 Yes
Operating System cisco ios_xr 24.2.11 Yes

References