First published: Wed Mar 27 2024(Updated: )
A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper management of mDNS client entries. An attacker could exploit this vulnerability by connecting to the wireless network and sending a continuous stream of specific mDNS packets. A successful exploit could allow the attacker to cause the wireless controller to have high CPU utilization, which could lead to access points (APs) losing their connection to the controller and result in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20303 is considered a high severity vulnerability due to its potential to cause denial of service conditions.
CVE-2024-20303 allows an unauthenticated, adjacent attacker to exploit the multicast DNS feature to trigger a denial of service.
To mitigate CVE-2024-20303, you should update your Cisco IOS XE Software to the latest recommended version provided by Cisco.
CVE-2024-20303 affects Wireless LAN Controllers (WLCs) running vulnerable versions of Cisco IOS XE Software.
No, CVE-2024-20303 requires an adjacent attacker to exploit the vulnerability, limiting the attack vector to local networks.