First published: Wed Aug 28 2024(Updated: )
A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20446 has a high severity rating due to its potential to cause a denial of service condition.
To mitigate CVE-2024-20446, upgrade your Cisco NX-OS Software to the latest version that includes the security patch.
CVE-2024-20446 affects devices running Cisco NX-OS Software that utilize DHCPv6 relay agents.
Yes, CVE-2024-20446 can be exploited by unauthenticated remote attackers.
The impact of CVE-2024-20446 is significant as it can lead to a denial of service, disrupting network availability.