First published: Wed Mar 27 2024(Updated: )
A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding. This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20309 has a high severity rating due to its potential impact on device availability.
To mitigate CVE-2024-20309, upgrade to the latest version of Cisco IOS XE Software that addresses this vulnerability.
Authenticated, local attackers can exploit CVE-2024-20309 on devices running affected versions of Cisco IOS XE Software.
Devices affected by CVE-2024-20309 may reload unexpectedly or stop responding due to improper handling of ingress traffic.
CVE-2024-20309 is not remotely exploitable as it requires local authentication to be attacked.