A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and have formed an adjacency.
History

Fri, 01 Nov 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-03-27T16:56:42.490Z

Updated: 2024-11-01T14:08:17.432Z

Reserved: 2023-11-08T15:08:07.631Z

Link: CVE-2024-20312

cve-icon Vulnrichment

Updated: 2024-08-01T21:59:42.142Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-27T17:15:52.690

Modified: 2024-11-21T08:52:20.100

Link: CVE-2024-20312

cve-icon Redhat

No data.