Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-20322
Vulnerability from cvelistv5
Published
2024-03-13 16:43
Modified
2024-08-02 19:49
Severity ?
EPSS score ?
Summary
A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XR Software |
Version: 7.10.2 Version: 7.11.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-iosxr-acl-bypass-RZU5NL3e", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:ios_xr_software:7.10.2:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xr_software", "vendor": "cisco", "versions": [ { "status": "affected", "version": "7.10.2" } ] }, { "cpes": [ "cpe:2.3:a:cisco:ios_xr_software:7.11.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xr_software", "vendor": "cisco", "versions": [ { "status": "affected", "version": "7.11.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20322", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T19:47:43.541856Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T19:49:57.842Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XR Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.10.2" }, { "status": "affected", "version": "7.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-13T16:43:53.196Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-iosxr-acl-bypass-RZU5NL3e", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" } ], "source": { "advisory": "cisco-sa-iosxr-acl-bypass-RZU5NL3e", "defects": [ "CSCwh77265" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20322", "datePublished": "2024-03-13T16:43:53.196Z", "dateReserved": "2023-11-08T15:08:07.640Z", "dateUpdated": "2024-08-02T19:49:57.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-20322\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-03-13T17:15:48.407\",\"lastModified\":\"2024-11-21T08:52:22.250\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\\r\\n\\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el procesamiento de la lista de control de acceso (ACL) en interfaces Pseudowire en la direcci\u00f3n de ingreso del software Cisco IOS XR podr\u00eda permitir que un atacante remoto no autenticado omita una ACL configurada. Esta vulnerabilidad se debe a una asignaci\u00f3n incorrecta de claves de b\u00fasqueda a contextos de interfaz interna. Un atacante podr\u00eda aprovechar esta vulnerabilidad intentando enviar tr\u00e1fico a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante acceder a recursos detr\u00e1s del dispositivo afectado que se supon\u00eda estaban protegidos por una ACL configurada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-03-13T16:43:53.196Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\\r\\n\\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.\"}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XR Software\", \"versions\": [{\"version\": \"7.10.2\", \"status\": \"affected\"}, {\"version\": \"7.11.1\", \"status\": \"affected\"}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Improper Access Control\", \"type\": \"cwe\", \"cweId\": \"CWE-284\"}]}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e\", \"name\": \"cisco-sa-iosxr-acl-bypass-RZU5NL3e\"}], \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N\", \"baseScore\": 5.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"source\": {\"advisory\": \"cisco-sa-iosxr-acl-bypass-RZU5NL3e\", \"discovery\": \"INTERNAL\", \"defects\": [\"CSCwh77265\"]}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:41.959Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e\", \"name\": \"cisco-sa-iosxr-acl-bypass-RZU5NL3e\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20322\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-02T19:47:43.541856Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:ios_xr_software:7.10.2:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"ios_xr_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.10.2\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:ios_xr_software:7.11.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"ios_xr_software\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.11.1\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-02T19:49:47.852Z\"}}]}", "cveMetadata": "{\"cveId\": \"CVE-2024-20322\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2023-11-08T15:08:07.640Z\", \"datePublished\": \"2024-03-13T16:43:53.196Z\", \"dateUpdated\": \"2024-08-02T19:49:57.842Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
gsd-2024-20322
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2024-20322", "id": "GSD-2024-20322" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-20322" ], "details": "A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.", "id": "GSD-2024-20322", "modified": "2023-12-13T01:21:42.794743Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2024-20322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS XR Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "7.10.2" }, { "version_affected": "=", "version_value": "7.11.1" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-284", "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" } ] }, "source": { "advisory": "cisco-sa-iosxr-acl-bypass-RZU5NL3e", "defects": [ "CSCwh77265" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "cve": { "descriptions": [ { "lang": "en", "value": "A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL." } ], "id": "CVE-2024-20322", "lastModified": "2024-03-13T18:15:58.530", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2024-03-13T17:15:48.407", "references": [ { "source": "ykramarz@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
cisco-sa-iosxr-acl-bypass-rzu5nl3e
Vulnerability from csaf_cisco
Published
2024-03-13 16:00
Modified
2024-03-13 16:00
Summary
Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities
Notes
Summary
Multiple vulnerabilities in the IP access control list (ACL) processing in the ingress direction on MPLS and Pseudowire (PW) interfaces of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are workarounds that address CVE-2024-20315. There are no workarounds that address CVE-2024-20322.
This advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299"].
Vulnerable Products
At the time of publication, these vulnerabilities affected the following Cisco products if they were running a vulnerable release of Cisco IOS XR Software and had IP packet filtering enabled in the ingress direction on MPLS or PW-Ether interfaces:
8000 Series Routers
IOS XR White box (IOSXRWBD)
Network Convergence Series (NCS) 540 Series Routers
NCS 560 Series Routers
NCS 5500 Series
NCS 5700 Series
Note: IP ingress ACL filtering on MPLS interfaces is not currently supported on any other Cisco IOS XR platforms.
For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software ["#fs"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
Determine Whether IP Packet Filtering is Enabled
MPLS Interfaces – CVE-2024-20315
To determine whether IP packet filtering in the ingress direction is enabled on any MPLS interface, complete the following steps:
1. Identify all MPLS Interfaces
To identify all MPLS interfaces, use the show mpls interfaces CLI command and look for interfaces with Yes in the Enabled column.
The following example shows the output of the show mpls interfaces command on a device on which interfaces TenGigE0/0/0/0 and TenGigE0/0/0/1 are MPLS enabled:
RP/0/RP0/CPU0:NCS5501#show mpls interfaces
Tue Jan 16 02:47:56.142 UTC
Interface LDP Tunnel Static Enabled
-------------------------- -------- -------- -------- --------
TenGigE0/0/0/0 No No No Yes
TenGigE0/0/0/1 No No No Yes
RP/0/RP0/CPU0:NCS5501#
2. Determine the Interface IP Packet Filtering Configuration
To determine if an interface has an IPv4 or IPv6 ACL configured, use the show running-config interface if_name CLI command.
The following example shows the output of the show running-config interface TenGigE0/0/0/0 command on a device that has both an IPv4 and an IPv6 ACL configured on interface TenGigE0/0/0/0 in the ingress direction:
RP/0/RP0/CPU0:NCS5501#show running-config interface TenGigE0/0/0/0
Tue Jan 16 02:49:45.385 UTC
interface TenGigE0/0/0/0
description ** Example where IPv4 and IPv6 ACL ingress applied **
ipv4 address 192.168.12.1 255.255.255.0
ipv4 access-group INGRESS_MPLS_IPV4_ACL ingress
ipv6 access-group INGRESS_MPLS_IPV6_ACL ingress
!
RP/0/RP0/CPU0:NCS5501#
If at least one MPLS interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.
PW-Ether Interfaces – CVE-2024-20322
To determine whether IP packet filtering in the ingress direction is enabled on any PW-Ether interface, complete the following steps:
1. Identify all PW-Ether Interfaces
To identify all PW-Ether interfaces use the show running-config | include ^interface PW-Ether CLI command.
The following example shows the output of the show running-config | include ^interface PW-Ether command on a device which has the two PW-Ether interfaces PW-Ether1 and PW-Ether2 configured:
RP/0/RP0/CPU0:NCS5501#show running-config | include ^interface PW-Ether
Tue Jan 16 10:59:15.163 UTC
Building configuration...
interface PW-Ether1
interface PW-Ether2
RP/0/RP0/CPU0:NCS5501#
2. Determine the Interface IP Packet Filtering Configuration
Use the show running-config interface if_name CLI command to determine if an interface has an IPv4 or IPv6 ACL configured.
The following example shows the output of the show running-config interface PW-Ether2 command on a device that has an IPv4 ACL configured on interface PW-Ether2 in the ingress direction:
RP/0/RP0/CPU0:NCS5501#show running-config interface PW-Ether2
Tue Jan 16 11:16:42.356 UTC
interface PW-Ether2
mtu 9000
vrf vxlan2
ipv4 address 196.168.48.1 255.255.255.0
attach generic-interface-list txlist1
ipv4 access-group INGRESS_VXLAN_IPV4_ACL ingress
!
RP/0/RP0/CPU0:NCS5501#
If at least one PW-Ether interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by these vulnerabilities.
Cisco has confirmed that these vulnerabilities do not affect the following Cisco products:
IOS Software
IOS XE Software
NX-OS Software
Details
The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability.
Exploitation of these vulnerabilities could allow an attacker to bypass protections that are provided by an ACL that is applied on an affected device. The overall impact of exploitation is organization specific because it depends on the importance of the assets that the ACL was supposed to protect. Customers should evaluate how exploitation of these vulnerabilities would impact their network and proceed according to their own vulnerability-handling and remediation processes.
Details about the vulnerabilities are as follows:
CVE-2024-20315: Cisco IOS XR Software MPLS Interfaces Access Control List Bypass Vulnerability
A vulnerability in the ACL processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
Bug ID(s): CSCwf99658 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf99658"]
CVE ID: CVE-2024-20315
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVE-2024-20322: Cisco IOS XR Software Pseudowire Interfaces Access Control List Bypass Vulnerability
A vulnerability in the ACL processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwh77265 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77265"]
CVE ID: CVE-2024-20322
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Workarounds
CVE-2024-20315: There is a workaround that addresses this vulnerability.
Customers could remove the ingress ACLs from the MPLS-enabled interfaces and use egress ACLs in their environment instead. Egress hybrid ACLs are supported in Cisco IOS XR releases 7.6.2 and later.
While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.
CVE-2024-20322: There are no workarounds that address this vulnerability.
Fixed Software
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Fixed Releases
At the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability.
CVE-2024-20315 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.8 and earlier Not vulnerable. Not vulnerable. 7.9 7.9.1 and 7.9.2 Migrate to a fixed release. 7.10 7.10.1 7.10.2 7.11 Not vulnerable. Not vulnerable. CVE-2024-20322 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.9 and earlier Not vulnerable. Not vulnerable. 7.10 7.10.2 Migrate to a fixed release. 7.11 7.11.1 7.11.2
The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Source
CVE-2024-20315: This vulnerability was found during internal security testing.
CVE-2024-20322: This vulnerability was found during the resolution of a Cisco TAC support case.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "CVE-2024-20315: This vulnerability was found during internal security testing.\r\n\r\nCVE-2024-20322: This vulnerability was found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the IP access control list (ACL) processing in the ingress direction on MPLS and Pseudowire (PW) interfaces of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are workarounds that address CVE-2024-20315. There are no workarounds that address CVE-2024-20322.\r\n\r\n\r\n\r\nThis advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299\"].", "title": "Summary" }, { "category": "general", "text": "At the time of publication, these vulnerabilities affected the following Cisco products if they were running a vulnerable release of Cisco IOS XR Software and had IP packet filtering enabled in the ingress direction on MPLS or PW-Ether interfaces:\r\n\r\n8000 Series Routers\r\nIOS XR White box (IOSXRWBD)\r\nNetwork Convergence Series (NCS) 540 Series Routers\r\nNCS 560 Series Routers\r\nNCS 5500 Series\r\nNCS 5700 Series\r\n\r\nNote: IP ingress ACL filtering on MPLS interfaces is not currently supported on any other Cisco IOS XR platforms.\r\n\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n Determine Whether IP Packet Filtering is Enabled\r\nMPLS Interfaces \u2013 CVE-2024-20315\r\n\r\nTo determine whether IP packet filtering in the ingress direction is enabled on any MPLS interface, complete the following steps:\r\n 1. Identify all MPLS Interfaces\r\nTo identify all MPLS interfaces, use the show mpls interfaces CLI command and look for interfaces with Yes in the Enabled column.\r\n\r\nThe following example shows the output of the show mpls interfaces command on a device on which interfaces TenGigE0/0/0/0 and TenGigE0/0/0/1 are MPLS enabled:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show mpls interfaces\r\nTue Jan 16 02:47:56.142 UTC\r\nInterface LDP Tunnel Static Enabled\r\n-------------------------- -------- -------- -------- --------\r\nTenGigE0/0/0/0 No No No Yes\r\nTenGigE0/0/0/1 No No No Yes\r\nRP/0/RP0/CPU0:NCS5501#\r\n 2. Determine the Interface IP Packet Filtering Configuration\r\nTo determine if an interface has an IPv4 or IPv6 ACL configured, use the show running-config interface if_name CLI command.\r\n\r\nThe following example shows the output of the show running-config interface TenGigE0/0/0/0 command on a device that has both an IPv4 and an IPv6 ACL configured on interface TenGigE0/0/0/0 in the ingress direction:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show running-config interface TenGigE0/0/0/0\r\nTue Jan 16 02:49:45.385 UTC\r\ninterface TenGigE0/0/0/0\r\n description ** Example where IPv4 and IPv6 ACL ingress applied **\r\n ipv4 address 192.168.12.1 255.255.255.0\r\n ipv4 access-group INGRESS_MPLS_IPV4_ACL ingress\r\nipv6 access-group INGRESS_MPLS_IPV6_ACL ingress\r\n!\r\n\r\nRP/0/RP0/CPU0:NCS5501#\r\n\r\nIf at least one MPLS interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.\r\n\r\nPW-Ether Interfaces \u2013 CVE-2024-20322\r\n\r\nTo determine whether IP packet filtering in the ingress direction is enabled on any PW-Ether interface, complete the following steps:\r\n 1. Identify all PW-Ether Interfaces\r\nTo identify all PW-Ether interfaces use the show running-config | include ^interface PW-Ether CLI command.\r\n\r\nThe following example shows the output of the show running-config | include ^interface PW-Ether command on a device which has the two PW-Ether interfaces PW-Ether1 and PW-Ether2 configured:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show running-config | include ^interface PW-Ether\r\nTue Jan 16 10:59:15.163 UTC\r\nBuilding configuration...\r\ninterface PW-Ether1\r\ninterface PW-Ether2\r\nRP/0/RP0/CPU0:NCS5501#\r\n 2. Determine the Interface IP Packet Filtering Configuration\r\nUse the show running-config interface if_name CLI command to determine if an interface has an IPv4 or IPv6 ACL configured.\r\n\r\nThe following example shows the output of the show running-config interface PW-Ether2 command on a device that has an IPv4 ACL configured on interface PW-Ether2 in the ingress direction:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show running-config interface PW-Ether2\r\nTue Jan 16 11:16:42.356 UTC\r\ninterface PW-Ether2\r\nmtu 9000\r\nvrf vxlan2\r\nipv4 address 196.168.48.1 255.255.255.0\r\n attach generic-interface-list txlist1\r\n ipv4 access-group INGRESS_VXLAN_IPV4_ACL ingress\r\n!\r\n\r\nRP/0/RP0/CPU0:NCS5501#\r\n\r\nIf at least one PW-Ether interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following Cisco products:\r\n\r\nIOS Software\r\nIOS XE Software\r\nNX-OS Software", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability.\r\n\r\nExploitation of these vulnerabilities could allow an attacker to bypass protections that are provided by an ACL that is applied on an affected device. The overall impact of exploitation is organization specific because it depends on the importance of the assets that the ACL was supposed to protect. Customers should evaluate how exploitation of these vulnerabilities would impact their network and proceed according to their own vulnerability-handling and remediation processes.\r\n\r\nDetails about the vulnerabilities are as follows:\r\n CVE-2024-20315: Cisco IOS XR Software MPLS Interfaces Access Control List Bypass Vulnerability\r\nA vulnerability in the ACL processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.\r\n\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwf99658 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf99658\"]\r\nCVE ID: CVE-2024-20315\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.8\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N\r\n CVE-2024-20322: Cisco IOS XR Software Pseudowire Interfaces Access Control List Bypass Vulnerability\r\nA vulnerability in the ACL processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwh77265 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77265\"]\r\nCVE ID: CVE-2024-20322\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.8\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "title": "Details" }, { "category": "general", "text": "CVE-2024-20315: There is a workaround that addresses this vulnerability.\r\n\r\nCustomers could remove the ingress ACLs from the MPLS-enabled interfaces and use egress ACLs in their environment instead. Egress hybrid ACLs are supported in Cisco IOS XR releases 7.6.2 and later.\r\n\r\nWhile this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.\r\n\r\nCVE-2024-20322: There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability.\r\n CVE-2024-20315 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.8 and earlier Not vulnerable. Not vulnerable. 7.9 7.9.1 and 7.9.2 Migrate to a fixed release. 7.10 7.10.1 7.10.2 7.11 Not vulnerable. Not vulnerable. CVE-2024-20322 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.9 and earlier Not vulnerable. Not vulnerable. 7.10 7.10.2 Migrate to a fixed release. 7.11 7.11.1 7.11.2\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "CVE-2024-20315: This vulnerability was found during internal security testing.\r\n\r\nCVE-2024-20322: This vulnerability was found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" }, { "category": "external", "summary": "Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "CSCwf99658", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf99658" }, { "category": "external", "summary": "CSCwh77265", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77265" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities", "tracking": { "current_release_date": "2024-03-13T16:00:00+00:00", "generator": { "date": "2024-05-10T23:29:23+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-iosxr-acl-bypass-RZU5NL3e", "initial_release_date": "2024-03-13T16:00:00+00:00", "revision_history": [ { "date": "2024-03-13T15:56:38+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco IOS XR Software", "product": { "name": "Cisco IOS XR Software ", "product_id": "CSAFPID-5834" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20315", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwf99658" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-5834" ] }, "release_date": "2024-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-5834" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-5834" ] } ], "title": "Cisco IOS XR Software MPLS Access Contol List Bypass Vulnerability" }, { "cve": "CVE-2024-20322", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwh77265" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-5834" ] }, "release_date": "2024-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-5834" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-5834" ] } ], "title": "Cisco IOS XR Software Pseudowire Interfaces Access Control List Bypass Vulnerability" } ] }
cisco-sa-iosxr-acl-bypass-RZU5NL3e
Vulnerability from csaf_cisco
Published
2024-03-13 16:00
Modified
2024-03-13 16:00
Summary
Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities
Notes
Summary
Multiple vulnerabilities in the IP access control list (ACL) processing in the ingress direction on MPLS and Pseudowire (PW) interfaces of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are workarounds that address CVE-2024-20315. There are no workarounds that address CVE-2024-20322.
This advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299"].
Vulnerable Products
At the time of publication, these vulnerabilities affected the following Cisco products if they were running a vulnerable release of Cisco IOS XR Software and had IP packet filtering enabled in the ingress direction on MPLS or PW-Ether interfaces:
8000 Series Routers
IOS XR White box (IOSXRWBD)
Network Convergence Series (NCS) 540 Series Routers
NCS 560 Series Routers
NCS 5500 Series
NCS 5700 Series
Note: IP ingress ACL filtering on MPLS interfaces is not currently supported on any other Cisco IOS XR platforms.
For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software ["#fs"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
Determine Whether IP Packet Filtering is Enabled
MPLS Interfaces – CVE-2024-20315
To determine whether IP packet filtering in the ingress direction is enabled on any MPLS interface, complete the following steps:
1. Identify all MPLS Interfaces
To identify all MPLS interfaces, use the show mpls interfaces CLI command and look for interfaces with Yes in the Enabled column.
The following example shows the output of the show mpls interfaces command on a device on which interfaces TenGigE0/0/0/0 and TenGigE0/0/0/1 are MPLS enabled:
RP/0/RP0/CPU0:NCS5501#show mpls interfaces
Tue Jan 16 02:47:56.142 UTC
Interface LDP Tunnel Static Enabled
-------------------------- -------- -------- -------- --------
TenGigE0/0/0/0 No No No Yes
TenGigE0/0/0/1 No No No Yes
RP/0/RP0/CPU0:NCS5501#
2. Determine the Interface IP Packet Filtering Configuration
To determine if an interface has an IPv4 or IPv6 ACL configured, use the show running-config interface if_name CLI command.
The following example shows the output of the show running-config interface TenGigE0/0/0/0 command on a device that has both an IPv4 and an IPv6 ACL configured on interface TenGigE0/0/0/0 in the ingress direction:
RP/0/RP0/CPU0:NCS5501#show running-config interface TenGigE0/0/0/0
Tue Jan 16 02:49:45.385 UTC
interface TenGigE0/0/0/0
description ** Example where IPv4 and IPv6 ACL ingress applied **
ipv4 address 192.168.12.1 255.255.255.0
ipv4 access-group INGRESS_MPLS_IPV4_ACL ingress
ipv6 access-group INGRESS_MPLS_IPV6_ACL ingress
!
RP/0/RP0/CPU0:NCS5501#
If at least one MPLS interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.
PW-Ether Interfaces – CVE-2024-20322
To determine whether IP packet filtering in the ingress direction is enabled on any PW-Ether interface, complete the following steps:
1. Identify all PW-Ether Interfaces
To identify all PW-Ether interfaces use the show running-config | include ^interface PW-Ether CLI command.
The following example shows the output of the show running-config | include ^interface PW-Ether command on a device which has the two PW-Ether interfaces PW-Ether1 and PW-Ether2 configured:
RP/0/RP0/CPU0:NCS5501#show running-config | include ^interface PW-Ether
Tue Jan 16 10:59:15.163 UTC
Building configuration...
interface PW-Ether1
interface PW-Ether2
RP/0/RP0/CPU0:NCS5501#
2. Determine the Interface IP Packet Filtering Configuration
Use the show running-config interface if_name CLI command to determine if an interface has an IPv4 or IPv6 ACL configured.
The following example shows the output of the show running-config interface PW-Ether2 command on a device that has an IPv4 ACL configured on interface PW-Ether2 in the ingress direction:
RP/0/RP0/CPU0:NCS5501#show running-config interface PW-Ether2
Tue Jan 16 11:16:42.356 UTC
interface PW-Ether2
mtu 9000
vrf vxlan2
ipv4 address 196.168.48.1 255.255.255.0
attach generic-interface-list txlist1
ipv4 access-group INGRESS_VXLAN_IPV4_ACL ingress
!
RP/0/RP0/CPU0:NCS5501#
If at least one PW-Ether interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by these vulnerabilities.
Cisco has confirmed that these vulnerabilities do not affect the following Cisco products:
IOS Software
IOS XE Software
NX-OS Software
Details
The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability.
Exploitation of these vulnerabilities could allow an attacker to bypass protections that are provided by an ACL that is applied on an affected device. The overall impact of exploitation is organization specific because it depends on the importance of the assets that the ACL was supposed to protect. Customers should evaluate how exploitation of these vulnerabilities would impact their network and proceed according to their own vulnerability-handling and remediation processes.
Details about the vulnerabilities are as follows:
CVE-2024-20315: Cisco IOS XR Software MPLS Interfaces Access Control List Bypass Vulnerability
A vulnerability in the ACL processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
Bug ID(s): CSCwf99658 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf99658"]
CVE ID: CVE-2024-20315
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVE-2024-20322: Cisco IOS XR Software Pseudowire Interfaces Access Control List Bypass Vulnerability
A vulnerability in the ACL processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwh77265 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77265"]
CVE ID: CVE-2024-20322
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Workarounds
CVE-2024-20315: There is a workaround that addresses this vulnerability.
Customers could remove the ingress ACLs from the MPLS-enabled interfaces and use egress ACLs in their environment instead. Egress hybrid ACLs are supported in Cisco IOS XR releases 7.6.2 and later.
While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.
CVE-2024-20322: There are no workarounds that address this vulnerability.
Fixed Software
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Fixed Releases
At the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability.
CVE-2024-20315 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.8 and earlier Not vulnerable. Not vulnerable. 7.9 7.9.1 and 7.9.2 Migrate to a fixed release. 7.10 7.10.1 7.10.2 7.11 Not vulnerable. Not vulnerable. CVE-2024-20322 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.9 and earlier Not vulnerable. Not vulnerable. 7.10 7.10.2 Migrate to a fixed release. 7.11 7.11.1 7.11.2
The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Source
CVE-2024-20315: This vulnerability was found during internal security testing.
CVE-2024-20322: This vulnerability was found during the resolution of a Cisco TAC support case.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "CVE-2024-20315: This vulnerability was found during internal security testing.\r\n\r\nCVE-2024-20322: This vulnerability was found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the IP access control list (ACL) processing in the ingress direction on MPLS and Pseudowire (PW) interfaces of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are workarounds that address CVE-2024-20315. There are no workarounds that address CVE-2024-20322.\r\n\r\n\r\n\r\nThis advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299\"].", "title": "Summary" }, { "category": "general", "text": "At the time of publication, these vulnerabilities affected the following Cisco products if they were running a vulnerable release of Cisco IOS XR Software and had IP packet filtering enabled in the ingress direction on MPLS or PW-Ether interfaces:\r\n\r\n8000 Series Routers\r\nIOS XR White box (IOSXRWBD)\r\nNetwork Convergence Series (NCS) 540 Series Routers\r\nNCS 560 Series Routers\r\nNCS 5500 Series\r\nNCS 5700 Series\r\n\r\nNote: IP ingress ACL filtering on MPLS interfaces is not currently supported on any other Cisco IOS XR platforms.\r\n\r\nFor information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n Determine Whether IP Packet Filtering is Enabled\r\nMPLS Interfaces \u2013 CVE-2024-20315\r\n\r\nTo determine whether IP packet filtering in the ingress direction is enabled on any MPLS interface, complete the following steps:\r\n 1. Identify all MPLS Interfaces\r\nTo identify all MPLS interfaces, use the show mpls interfaces CLI command and look for interfaces with Yes in the Enabled column.\r\n\r\nThe following example shows the output of the show mpls interfaces command on a device on which interfaces TenGigE0/0/0/0 and TenGigE0/0/0/1 are MPLS enabled:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show mpls interfaces\r\nTue Jan 16 02:47:56.142 UTC\r\nInterface LDP Tunnel Static Enabled\r\n-------------------------- -------- -------- -------- --------\r\nTenGigE0/0/0/0 No No No Yes\r\nTenGigE0/0/0/1 No No No Yes\r\nRP/0/RP0/CPU0:NCS5501#\r\n 2. Determine the Interface IP Packet Filtering Configuration\r\nTo determine if an interface has an IPv4 or IPv6 ACL configured, use the show running-config interface if_name CLI command.\r\n\r\nThe following example shows the output of the show running-config interface TenGigE0/0/0/0 command on a device that has both an IPv4 and an IPv6 ACL configured on interface TenGigE0/0/0/0 in the ingress direction:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show running-config interface TenGigE0/0/0/0\r\nTue Jan 16 02:49:45.385 UTC\r\ninterface TenGigE0/0/0/0\r\n description ** Example where IPv4 and IPv6 ACL ingress applied **\r\n ipv4 address 192.168.12.1 255.255.255.0\r\n ipv4 access-group INGRESS_MPLS_IPV4_ACL ingress\r\nipv6 access-group INGRESS_MPLS_IPV6_ACL ingress\r\n!\r\n\r\nRP/0/RP0/CPU0:NCS5501#\r\n\r\nIf at least one MPLS interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.\r\n\r\nPW-Ether Interfaces \u2013 CVE-2024-20322\r\n\r\nTo determine whether IP packet filtering in the ingress direction is enabled on any PW-Ether interface, complete the following steps:\r\n 1. Identify all PW-Ether Interfaces\r\nTo identify all PW-Ether interfaces use the show running-config | include ^interface PW-Ether CLI command.\r\n\r\nThe following example shows the output of the show running-config | include ^interface PW-Ether command on a device which has the two PW-Ether interfaces PW-Ether1 and PW-Ether2 configured:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show running-config | include ^interface PW-Ether\r\nTue Jan 16 10:59:15.163 UTC\r\nBuilding configuration...\r\ninterface PW-Ether1\r\ninterface PW-Ether2\r\nRP/0/RP0/CPU0:NCS5501#\r\n 2. Determine the Interface IP Packet Filtering Configuration\r\nUse the show running-config interface if_name CLI command to determine if an interface has an IPv4 or IPv6 ACL configured.\r\n\r\nThe following example shows the output of the show running-config interface PW-Ether2 command on a device that has an IPv4 ACL configured on interface PW-Ether2 in the ingress direction:\r\n\r\n\r\nRP/0/RP0/CPU0:NCS5501#show running-config interface PW-Ether2\r\nTue Jan 16 11:16:42.356 UTC\r\ninterface PW-Ether2\r\nmtu 9000\r\nvrf vxlan2\r\nipv4 address 196.168.48.1 255.255.255.0\r\n attach generic-interface-list txlist1\r\n ipv4 access-group INGRESS_VXLAN_IPV4_ACL ingress\r\n!\r\n\r\nRP/0/RP0/CPU0:NCS5501#\r\n\r\nIf at least one PW-Ether interface has an IPv4 or IPv6 (or both) ingress ACL applied, the device is affected by this vulnerability.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following Cisco products:\r\n\r\nIOS Software\r\nIOS XE Software\r\nNX-OS Software", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability.\r\n\r\nExploitation of these vulnerabilities could allow an attacker to bypass protections that are provided by an ACL that is applied on an affected device. The overall impact of exploitation is organization specific because it depends on the importance of the assets that the ACL was supposed to protect. Customers should evaluate how exploitation of these vulnerabilities would impact their network and proceed according to their own vulnerability-handling and remediation processes.\r\n\r\nDetails about the vulnerabilities are as follows:\r\n CVE-2024-20315: Cisco IOS XR Software MPLS Interfaces Access Control List Bypass Vulnerability\r\nA vulnerability in the ACL processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.\r\n\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwf99658 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf99658\"]\r\nCVE ID: CVE-2024-20315\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.8\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N\r\n CVE-2024-20322: Cisco IOS XR Software Pseudowire Interfaces Access Control List Bypass Vulnerability\r\nA vulnerability in the ACL processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCwh77265 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77265\"]\r\nCVE ID: CVE-2024-20322\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.8\r\nCVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "title": "Details" }, { "category": "general", "text": "CVE-2024-20315: There is a workaround that addresses this vulnerability.\r\n\r\nCustomers could remove the ingress ACLs from the MPLS-enabled interfaces and use egress ACLs in their environment instead. Egress hybrid ACLs are supported in Cisco IOS XR releases 7.6.2 and later.\r\n\r\nWhile this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.\r\n\r\nCVE-2024-20322: There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability.\r\n CVE-2024-20315 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.8 and earlier Not vulnerable. Not vulnerable. 7.9 7.9.1 and 7.9.2 Migrate to a fixed release. 7.10 7.10.1 7.10.2 7.11 Not vulnerable. Not vulnerable. CVE-2024-20322 Cisco IOS XR Software Release Affected Releases First Fixed Release 7.9 and earlier Not vulnerable. Not vulnerable. 7.10 7.10.2 Migrate to a fixed release. 7.11 7.11.1 7.11.2\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "CVE-2024-20315: This vulnerability was found during internal security testing.\r\n\r\nCVE-2024-20322: This vulnerability was found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" }, { "category": "external", "summary": "Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "CSCwf99658", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf99658" }, { "category": "external", "summary": "CSCwh77265", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh77265" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco IOS XR Software MPLS and Pseudowire Interfaces Access Control List Bypass Vulnerabilities", "tracking": { "current_release_date": "2024-03-13T16:00:00+00:00", "generator": { "date": "2024-05-10T23:29:23+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-iosxr-acl-bypass-RZU5NL3e", "initial_release_date": "2024-03-13T16:00:00+00:00", "revision_history": [ { "date": "2024-03-13T15:56:38+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco IOS XR Software", "product": { "name": "Cisco IOS XR Software ", "product_id": "CSAFPID-5834" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20315", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwf99658" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-5834" ] }, "release_date": "2024-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-5834" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-5834" ] } ], "title": "Cisco IOS XR Software MPLS Access Contol List Bypass Vulnerability" }, { "cve": "CVE-2024-20322", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwh77265" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-5834" ] }, "release_date": "2024-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-5834" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-5834" ] } ], "title": "Cisco IOS XR Software Pseudowire Interfaces Access Control List Bypass Vulnerability" } ] }
wid-sec-w-2024-0631
Vulnerability from csaf_certbund
Published
2024-03-13 23:00
Modified
2024-11-24 23:00
Summary
Cisco IOS XR: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das für Cisco Geräte wie z. B. Router und Switches eingesetzt wird.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco IOS XR ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsmaßnahmen zu umgehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- CISCO Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das f\u00fcr Cisco Ger\u00e4te wie z. B. Router und Switches eingesetzt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco IOS XR ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0631 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0631.json" }, { "category": "self", "summary": "WID-SEC-2024-0631 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0631" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dhcp-dos-3tgPKRdm" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pppma-JKWFgneW" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-dos-kb6sUUHw" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrl2vpn-jesrU3fc" } ], "source_lang": "en-US", "title": "Cisco IOS XR: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-24T23:00:00.000+00:00", "generator": { "date": "2024-11-25T09:15:37.975+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0631", "initial_release_date": "2024-03-13T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-13T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.9.2", "product": { "name": "Cisco IOS XR \u003c7.9.2", "product_id": "T033474" } }, { "category": "product_version", "name": "7.9.2", "product": { "name": "Cisco IOS XR 7.9.2", "product_id": "T033474-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.9.2" } } }, { "category": "product_version_range", "name": "\u003c7.10.1", "product": { "name": "Cisco IOS XR \u003c7.10.1", "product_id": "T033475" } }, { "category": "product_version", "name": "7.10.1", "product": { "name": "Cisco IOS XR 7.10.1", "product_id": "T033475-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.10.1" } } }, { "category": "product_version_range", "name": "\u003c24.1.1", "product": { "name": "Cisco IOS XR \u003c24.1.1", "product_id": "T033476" } }, { "category": "product_version", "name": "24.1.1", "product": { "name": "Cisco IOS XR 24.1.1", "product_id": "T033476-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:24.1.1" } } }, { "category": "product_version_range", "name": "\u003c7.10.2", "product": { "name": "Cisco IOS XR \u003c7.10.2", "product_id": "T033477" } }, { "category": "product_version", "name": "7.10.2", "product": { "name": "Cisco IOS XR 7.10.2", "product_id": "T033477-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.10.2" } } }, { "category": "product_version_range", "name": "\u003c7.11.1", "product": { "name": "Cisco IOS XR \u003c7.11.1", "product_id": "T033478" } }, { "category": "product_version", "name": "7.11.1", "product": { "name": "Cisco IOS XR 7.11.1", "product_id": "T033478-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.11.1" } } }, { "category": "product_version_range", "name": "\u003c7.9.21", "product": { "name": "Cisco IOS XR \u003c7.9.21", "product_id": "T033479" } }, { "category": "product_version", "name": "7.9.21", "product": { "name": "Cisco IOS XR 7.9.21", "product_id": "T033479-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.9.21" } } }, { "category": "product_version_range", "name": "\u003c7.11.2", "product": { "name": "Cisco IOS XR \u003c7.11.2", "product_id": "T033481" } }, { "category": "product_version", "name": "7.11.2", "product": { "name": "Cisco IOS XR 7.11.2", "product_id": "T033481-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.11.2" } } } ], "category": "product_name", "name": "IOS XR" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20262", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht im Secure Copy Protocol (SCP) und der SFTP-Funktion aufgrund einer fehlenden Validierung der SCP- und SFTP-CLI-Eingabeparameter. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, indem er sich am Ger\u00e4t authentifiziert und SCP- oder SFTP-CLI-Befehle mit bestimmten Parametern ausgibt, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033475", "T033476", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20262" }, { "cve": "CVE-2024-20266", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht in der DHCP Version 4 (DHCPv4) Serverfunktion, da bestimmte DHCPv4-Meldungen bei der Verarbeitung nicht ordnungsgem\u00e4\u00df validiert werden. Durch das Senden einer fehlerhaften DHCPv4-Meldung an ein betroffenes Ger\u00e4t kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033475", "T033476", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20266" }, { "cve": "CVE-2024-20315", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Cisco IOS XR. Diese Fehler bestehen in der IP-Zugangskontrollliste (ACL) aufgrund einer unsachgem\u00e4\u00dfen Zuweisung von Nachschlageschl\u00fcsseln zu internen Schnittstellenkontexten. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033481", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20315" }, { "cve": "CVE-2024-20322", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Cisco IOS XR. Diese Fehler bestehen in der IP-Zugangskontrollliste (ACL) aufgrund einer unsachgem\u00e4\u00dfen Zuweisung von Nachschlageschl\u00fcsseln zu internen Schnittstellenkontexten. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033481", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20322" }, { "cve": "CVE-2024-20318", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht in den Layer-2-Ethernet-Diensten aufgrund der falschen Behandlung bestimmter Ethernet-Frames. Ein benachbarter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20318" }, { "cve": "CVE-2024-20319", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht im UDP-Weiterleitungscode aufgrund einer falschen UDP-Weiterleitungsprogrammierung bei der Verwendung von SNMP mit Management-Plane-Schutz. Durch den Versuch, einen SNMP-Vorgang mit Broadcast als Zieladresse durchzuf\u00fchren, kann ein benachbarter, anonymer Angreifer diese Schwachstelle ausnutzen, um konfigurierte Schutzrichtlinien f\u00fcr die Verwaltungsebene zu umgehen und auf den SNMP-Server (Simple Network Management Plane) zuzugreifen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033481", "T033475", "T033476", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20319" }, { "cve": "CVE-2024-20320", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht in der SSH-Client-Funktion aufgrund einer unzureichenden Validierung von Argumenten, die im SSH-Client-CLI-Befehl enthalten sind. Durch die Ausgabe eines manipulierten SSH-Client-Befehls an die CLI kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20320" }, { "cve": "CVE-2024-20327", "notes": [ { "category": "description", "text": "There is a vulnerability in Cisco IOS XR. This flaw exists in the PPP over Ethernet (PPPoE) termination feature due to the improper handling of malformed PPPoE packets. By sending a crafted PPPoE packet to an affected line card interface, an adjacent, anonymous attacker can exploit this vulnerability to cause a Denial of Service condition." } ], "product_status": { "known_affected": [ "T033479", "T033478", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20327" } ] }
WID-SEC-W-2024-0631
Vulnerability from csaf_certbund
Published
2024-03-13 23:00
Modified
2024-11-24 23:00
Summary
Cisco IOS XR: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das für Cisco Geräte wie z. B. Router und Switches eingesetzt wird.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco IOS XR ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsmaßnahmen zu umgehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- CISCO Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das f\u00fcr Cisco Ger\u00e4te wie z. B. Router und Switches eingesetzt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco IOS XR ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0631 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0631.json" }, { "category": "self", "summary": "WID-SEC-2024-0631 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0631" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dhcp-dos-3tgPKRdm" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pppma-JKWFgneW" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-dos-kb6sUUHw" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-13", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrl2vpn-jesrU3fc" } ], "source_lang": "en-US", "title": "Cisco IOS XR: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-24T23:00:00.000+00:00", "generator": { "date": "2024-11-25T09:15:37.975+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0631", "initial_release_date": "2024-03-13T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-13T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.9.2", "product": { "name": "Cisco IOS XR \u003c7.9.2", "product_id": "T033474" } }, { "category": "product_version", "name": "7.9.2", "product": { "name": "Cisco IOS XR 7.9.2", "product_id": "T033474-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.9.2" } } }, { "category": "product_version_range", "name": "\u003c7.10.1", "product": { "name": "Cisco IOS XR \u003c7.10.1", "product_id": "T033475" } }, { "category": "product_version", "name": "7.10.1", "product": { "name": "Cisco IOS XR 7.10.1", "product_id": "T033475-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.10.1" } } }, { "category": "product_version_range", "name": "\u003c24.1.1", "product": { "name": "Cisco IOS XR \u003c24.1.1", "product_id": "T033476" } }, { "category": "product_version", "name": "24.1.1", "product": { "name": "Cisco IOS XR 24.1.1", "product_id": "T033476-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:24.1.1" } } }, { "category": "product_version_range", "name": "\u003c7.10.2", "product": { "name": "Cisco IOS XR \u003c7.10.2", "product_id": "T033477" } }, { "category": "product_version", "name": "7.10.2", "product": { "name": "Cisco IOS XR 7.10.2", "product_id": "T033477-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.10.2" } } }, { "category": "product_version_range", "name": "\u003c7.11.1", "product": { "name": "Cisco IOS XR \u003c7.11.1", "product_id": "T033478" } }, { "category": "product_version", "name": "7.11.1", "product": { "name": "Cisco IOS XR 7.11.1", "product_id": "T033478-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.11.1" } } }, { "category": "product_version_range", "name": "\u003c7.9.21", "product": { "name": "Cisco IOS XR \u003c7.9.21", "product_id": "T033479" } }, { "category": "product_version", "name": "7.9.21", "product": { "name": "Cisco IOS XR 7.9.21", "product_id": "T033479-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.9.21" } } }, { "category": "product_version_range", "name": "\u003c7.11.2", "product": { "name": "Cisco IOS XR \u003c7.11.2", "product_id": "T033481" } }, { "category": "product_version", "name": "7.11.2", "product": { "name": "Cisco IOS XR 7.11.2", "product_id": "T033481-fixed", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:7.11.2" } } } ], "category": "product_name", "name": "IOS XR" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20262", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht im Secure Copy Protocol (SCP) und der SFTP-Funktion aufgrund einer fehlenden Validierung der SCP- und SFTP-CLI-Eingabeparameter. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, indem er sich am Ger\u00e4t authentifiziert und SCP- oder SFTP-CLI-Befehle mit bestimmten Parametern ausgibt, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033475", "T033476", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20262" }, { "cve": "CVE-2024-20266", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht in der DHCP Version 4 (DHCPv4) Serverfunktion, da bestimmte DHCPv4-Meldungen bei der Verarbeitung nicht ordnungsgem\u00e4\u00df validiert werden. Durch das Senden einer fehlerhaften DHCPv4-Meldung an ein betroffenes Ger\u00e4t kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033475", "T033476", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20266" }, { "cve": "CVE-2024-20315", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Cisco IOS XR. Diese Fehler bestehen in der IP-Zugangskontrollliste (ACL) aufgrund einer unsachgem\u00e4\u00dfen Zuweisung von Nachschlageschl\u00fcsseln zu internen Schnittstellenkontexten. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033481", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20315" }, { "cve": "CVE-2024-20322", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Cisco IOS XR. Diese Fehler bestehen in der IP-Zugangskontrollliste (ACL) aufgrund einer unsachgem\u00e4\u00dfen Zuweisung von Nachschlageschl\u00fcsseln zu internen Schnittstellenkontexten. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033481", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20322" }, { "cve": "CVE-2024-20318", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht in den Layer-2-Ethernet-Diensten aufgrund der falschen Behandlung bestimmter Ethernet-Frames. Ein benachbarter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20318" }, { "cve": "CVE-2024-20319", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht im UDP-Weiterleitungscode aufgrund einer falschen UDP-Weiterleitungsprogrammierung bei der Verwendung von SNMP mit Management-Plane-Schutz. Durch den Versuch, einen SNMP-Vorgang mit Broadcast als Zieladresse durchzuf\u00fchren, kann ein benachbarter, anonymer Angreifer diese Schwachstelle ausnutzen, um konfigurierte Schutzrichtlinien f\u00fcr die Verwaltungsebene zu umgehen und auf den SNMP-Server (Simple Network Management Plane) zuzugreifen." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033478", "T033481", "T033475", "T033476", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20319" }, { "cve": "CVE-2024-20320", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco IOS XR. Dieser Fehler besteht in der SSH-Client-Funktion aufgrund einer unzureichenden Validierung von Argumenten, die im SSH-Client-CLI-Befehl enthalten sind. Durch die Ausgabe eines manipulierten SSH-Client-Befehls an die CLI kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033479", "T033477", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20320" }, { "cve": "CVE-2024-20327", "notes": [ { "category": "description", "text": "There is a vulnerability in Cisco IOS XR. This flaw exists in the PPP over Ethernet (PPPoE) termination feature due to the improper handling of malformed PPPoE packets. By sending a crafted PPPoE packet to an affected line card interface, an adjacent, anonymous attacker can exploit this vulnerability to cause a Denial of Service condition." } ], "product_status": { "known_affected": [ "T033479", "T033478", "T033475", "T033474" ] }, "release_date": "2024-03-13T23:00:00.000+00:00", "title": "CVE-2024-20327" } ] }
ghsa-4wpx-q9gv-7mh7
Vulnerability from github
Published
2024-03-13 18:31
Modified
2024-03-13 18:31
Severity ?
Details
A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
{ "affected": [], "aliases": [ "CVE-2024-20322" ], "database_specific": { "cwe_ids": [ "CWE-284" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-03-13T17:15:48Z", "severity": "MODERATE" }, "details": "A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\n\n This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.", "id": "GHSA-4wpx-q9gv-7mh7", "modified": "2024-03-13T18:31:36Z", "published": "2024-03-13T18:31:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20322" }, { "type": "WEB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2024-20322
Vulnerability from fkie_nvd
Published
2024-03-13 17:15
Modified
2024-11-21 08:52
Severity ?
Summary
A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL." }, { "lang": "es", "value": "Una vulnerabilidad en el procesamiento de la lista de control de acceso (ACL) en interfaces Pseudowire en la direcci\u00f3n de ingreso del software Cisco IOS XR podr\u00eda permitir que un atacante remoto no autenticado omita una ACL configurada. Esta vulnerabilidad se debe a una asignaci\u00f3n incorrecta de claves de b\u00fasqueda a contextos de interfaz interna. Un atacante podr\u00eda aprovechar esta vulnerabilidad intentando enviar tr\u00e1fico a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante acceder a recursos detr\u00e1s del dispositivo afectado que se supon\u00eda estaban protegidos por una ACL configurada." } ], "id": "CVE-2024-20322", "lastModified": "2024-11-21T08:52:22.250", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-03-13T17:15:48.407", "references": [ { "source": "psirt@cisco.com", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-acl-bypass-RZU5NL3e" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.