First published: Wed Mar 13 2024(Updated: )
A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device. This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20319 has been rated as high severity due to the potential exploitation by unauthenticated attackers.
To mitigate CVE-2024-20319, it is recommended to apply the latest patches and updates provided by Cisco for IOS XR Software.
CVE-2024-20319 affects devices running Cisco IOS XR Software, particularly those with configured management plane protection policies.
The main risk of CVE-2024-20319 is that it allows unauthenticated attackers to bypass management plane protections and access the SNMP server.
CVE-2024-20319 can be exploited by adjacent attackers to gain unauthorized access to sensitive network management functionalities.