We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20304

Cisco IOS XR Software Packet Memory Exhaustion Vulnerability



Description

A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device. This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition. Note: This vulnerability can be exploited using IPv4 or IPv6.

Reserved 2023-11-08 | Published 2024-09-11 | Updated 2024-09-11 | Assigner cisco


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

Missing Release of Memory after Effective Lifetime

Product status

Default status
unknown

7.8.1
affected

7.8.12
affected

7.7.1
affected

7.7.2
affected

7.9.1
affected

7.10.1
affected

7.8.2
affected

7.8.22
affected

7.7.21
affected

7.9.2
affected

7.11.1
affected

7.9.21
affected

7.10.2
affected

24.1.1
affected

7.11.2
affected

24.2.1
affected

24.1.2
affected

24.2.11
affected

References

sec.cloudapps.cisco.com/...y/cisco-sa-pak-mem-exhst-3ke9FeFy (cisco-sa-pak-mem-exhst-3ke9FeFy)

cve.org (CVE-2024-20304)

nvd.nist.gov (CVE-2024-20304)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20304

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.