First published: Wed Mar 13 2024(Updated: )
A vulnerability in the PPP over Ethernet (PPPoE) termination feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to crash the ppp_ma process, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of malformed PPPoE packets that are received on a router that is running Broadband Network Gateway (BNG) functionality with PPPoE termination on a Lightspeed-based or Lightspeed-Plus-based line card. An attacker could exploit this vulnerability by sending a crafted PPPoE packet to an affected line card interface that does not terminate PPPoE. A successful exploit could allow the attacker to crash the ppp_ma process, resulting in a DoS condition for PPPoE traffic across the router.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | ||
Cisco ASR 9000 Series Aggregation Services Router Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-20327 is classified as high due to its potential to cause a denial of service.
To fix CVE-2024-20327, upgrade your Cisco IOS XR Software or ASR 9000 Series Routers to a version containing the security patch.
CVE-2024-20327 affects users of Cisco IOS XR Software and Cisco ASR 9000 Series Aggregation Services Routers.
CVE-2024-20327 exploits the PPP over Ethernet (PPPoE) termination feature, allowing denial of service through the ppp_ma process.
CVE-2024-20327 can be exploited by an unauthenticated adjacent attacker, making it relatively easy for someone within close network proximity.