First published: Wed Sep 11 2024(Updated: )
A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device.This vulnerability exists because the Mtrace2 code does not properly handle packet
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-pak-mem-exhst-3ke9FeFy is classified as critical.
cisco-sa-pak-mem-exhst-3ke9FeFy can lead to the exhaustion of UDP packet memory, potentially causing device instability.
To fix cisco-sa-pak-mem-exhst-3ke9FeFy, update your Cisco IOS XR Software to the latest patched version as recommended by Cisco.
Devices running the affected versions of Cisco IOS XR Software with the multicast traceroute feature enabled are susceptible to cisco-sa-pak-mem-exhst-3ke9FeFy.
Yes, cisco-sa-pak-mem-exhst-3ke9FeFy can be exploited by an unauthenticated remote attacker.