First published: Wed Sep 25 2024(Updated: )
A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =15.2\(8\)e2 | |
Puppet Cisco IOS | =15.2\(8\)e3 | |
Puppet Cisco IOS | =15.2\(8\)e4 | |
Puppet Cisco IOS | =15.2\(8\)e5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20465 has been assigned a high severity level due to its potential to allow unauthorized access.
To mitigate CVE-2024-20465, upgrade your Cisco IOS Software to the latest version that addresses this vulnerability.
CVE-2024-20465 affects Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches running specific versions of Cisco IOS.
Yes, CVE-2024-20465 can be exploited by unauthenticated remote attackers.
CVE-2024-20465 is caused by the incorrect handling of IPv4 ACLs in the access control list programming.