First published: Wed Mar 27 2024(Updated: )
A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20307 is rated as a critical severity vulnerability due to its potential to allow remote attackers to cause a heap overflow.
To fix CVE-2024-20307, upgrade to the recommended patched versions of Cisco IOS Software or Cisco IOS XE Software as specified in the security advisory.
Devices running unpatched versions of Cisco IOS Software and Cisco IOS XE Software are vulnerable to CVE-2024-20307.
CVE-2024-20307 can be exploited by unauthenticated remote attackers sending crafted fragmented IKEv1 packets.
If successfully exploited, CVE-2024-20307 could lead to a heap overflow that results in an affected device reloading.