First published: Wed Mar 27 2024(Updated: )
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco Catalyst 6000 Series Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20276 is classified as a high-severity vulnerability that can lead to device reloads.
To mitigate CVE-2024-20276, upgrade to the recommended version of Cisco IOS Software and implement proper traffic handling configurations.
CVE-2024-20276 affects Cisco IOS Software running on Cisco Catalyst 6000 Series Switches.
CVE-2024-20276 allows an unauthenticated, adjacent attacker to cause the affected device to reload unexpectedly.
CVE-2024-20276 was disclosed as part of Cisco's security advisory for vulnerabilities in its IOS Software.