First published: Wed Mar 13 2024(Updated: )
A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2024-20322 vulnerability is rated as high severity due to its potential for allowing unauthorized bypass of access control lists.
To fix CVE-2024-20322, update your Cisco IOS XR Software to the latest version that addresses this vulnerability as recommended by Cisco.
CVE-2024-20322 affects users of Cisco IOS XR Software specifically those implementing access control lists on Pseudowire interfaces.
CVE-2024-20322 can be exploited by unauthenticated, remote attackers to bypass configured access control lists on affected devices.
Currently, there are no official workarounds for CVE-2024-20322, so applying the available security updates is crucial.