A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL).
This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-03-27T16:49:03.113Z
Updated: 2024-08-01T21:59:42.197Z
Reserved: 2023-11-08T15:08:07.632Z
Link: CVE-2024-20316
Vulnrichment
Updated: 2024-08-01T21:59:42.197Z
NVD
Status : Awaiting Analysis
Published: 2024-03-27T17:15:53.110
Modified: 2024-03-27T17:48:21.140
Link: CVE-2024-20316
Redhat
No data.