Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2024-20304

Disclosure Date: September 11, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device.

This vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition.
Note: This vulnerability can be exploited using IPv4 or IPv6.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • cisco

Products

  • ios xr 24.1.1,
  • ios xr 24.1.2,
  • ios xr 24.2.1,
  • ios xr 24.2.11,
  • ios xr 7.10.1,
  • ios xr 7.10.2,
  • ios xr 7.11.1,
  • ios xr 7.11.2,
  • ios xr 7.7.1,
  • ios xr 7.7.2,
  • ios xr 7.7.21,
  • ios xr 7.8.1,
  • ios xr 7.8.12,
  • ios xr 7.8.2,
  • ios xr 7.8.22,
  • ios xr 7.9.1,
  • ios xr 7.9.2,
  • ios xr 7.9.21

Additional Info

Technical Analysis