First published: Wed Mar 27 2024(Updated: )
A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic..
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20308 is considered critical as it can lead to device reloads due to heap underflows.
To mitigate CVE-2024-20308, users should update their Cisco IOS and IOS XE Software to the latest versions provided by Cisco.
CVE-2024-20308 affects Cisco IOS Software and Cisco IOS XE Software.
Yes, CVE-2024-20308 allows unauthenticated, remote attackers to exploit the vulnerability.
CVE-2024-20308 enables attackers to cause a heap underflow by sending crafted, fragmented IKEv1 packets.