A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-03-27T17:23:40.022Z

Updated: 2024-08-01T21:59:41.468Z

Reserved: 2023-11-08T15:08:07.631Z

Link: CVE-2024-20307

cve-icon Vulnrichment

Updated: 2024-08-01T21:59:41.468Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-27T18:15:09.357

Modified: 2024-03-28T02:01:21.693

Link: CVE-2024-20307

cve-icon Redhat

No data.