First published: Wed Mar 27 2024(Updated: )
A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).This vulnerability is due to improper handling of
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-dmi-acl-bypass-Xv8FO8Vz vulnerability is rated as high severity due to the potential unauthorized access it allows.
To mitigate the cisco-sa-dmi-acl-bypass-Xv8FO8Vz vulnerability, it is recommended to upgrade to a patch version of Cisco IOS XE Software that addresses this issue.
Devices running Cisco IOS XE Software and configured with IPv4 access control lists are affected by the cisco-sa-dmi-acl-bypass-Xv8FO8Vz vulnerability.
An unauthenticated, remote attacker could exploit the cisco-sa-dmi-acl-bypass-Xv8FO8Vz vulnerability to bypass access controls and gain unauthorized access to resources.
Currently, there are no effective workarounds for the cisco-sa-dmi-acl-bypass-Xv8FO8Vz vulnerability; the best recommendation is to apply the available patches.