First published: Wed Mar 27 2024(Updated: )
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20259 is classified as a critical severity vulnerability that can lead to a denial of service (DoS) condition.
To mitigate CVE-2024-20259, users should upgrade to the latest version of Cisco IOS XE that addresses this vulnerability.
CVE-2024-20259 affects the DHCP snooping feature in Cisco IOS XE Software.
An unauthenticated, remote attacker can exploit CVE-2024-20259 to send a crafted DHCP request packet.
The exploitation of CVE-2024-20259 can cause affected devices to reload unexpectedly, resulting in service disruption.