Impact
The vulnerability lies in the DHCP snooping feature of Cisco IOS XE Software, where BOOTP packets are incorrectly routed between VLANs. This allows remote attackers to send BOOTP requests that cause packet leakage across VLAN boundaries, leading to excessive CPU usage and rendering the device unreachable through console or management interfaces. The weakness is a resource exhaustion flaw.
Affected Systems
Affected devices include Cisco Catalyst 9000 Series Switches running Cisco IOS XE Software; specific model and version ranges are not listed in the advisory.
Risk and Exploitability
The CVSS base score of 8.6 denotes a high impact. Exploitation requires an attacker with network access to send unicast or broadcast BOOTP packets, a scenario easily achievable in a LAN environment. Given the lack of an EPSS score and the absence in the KEV catalog, the vulnerability remains high risk without an available patch, necessitating immediate defensive actions.
OpenCVE Enrichment