Cisco IOS XR L2 Ethernet DoS via Ethernet Frame Reset
CVE-2024-20318 Published on March 13, 2024
A vulnerability in the Layer 2 Ethernet services of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the line card network processor to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of specific Ethernet frames that are received on line cards that have the Layer 2 services feature enabled. An attacker could exploit this vulnerability by sending specific Ethernet frames through an affected device. A successful exploit could allow the attacker to cause the ingress interface network processor to reset, resulting in a loss of traffic over the interfaces that are supported by the network processor. Multiple resets of the network processor would cause the line card to reset, resulting in a DoS condition.
Vulnerability Analysis
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Products Associated with CVE-2024-20318
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-20318 are published in Cisco Ios Xr:
Affected Versions
Cisco IOS XR Software:- Version 6.5.2 is affected.
- Version 6.5.3 is affected.
- Version 6.6.2 is affected.
- Version 6.6.3 is affected.
- Version 6.6.25 is affected.
- Version 7.0.1 is affected.
- Version 7.0.2 is affected.
- Version 7.1.1 is affected.
- Version 7.1.15 is affected.
- Version 7.1.2 is affected.
- Version 7.1.3 is affected.
- Version 6.7.1 is affected.
- Version 6.7.2 is affected.
- Version 6.7.3 is affected.
- Version 7.3.1 is affected.
- Version 7.3.2 is affected.
- Version 7.3.3 is affected.
- Version 7.3.5 is affected.
- Version 7.4.1 is affected.
- Version 7.4.2 is affected.
- Version 6.8.1 is affected.
- Version 6.8.2 is affected.
- Version 7.5.1 is affected.
- Version 7.5.3 is affected.
- Version 7.5.2 is affected.
- Version 7.5.4 is affected.
- Version 7.5.5 is affected.
- Version 7.6.1 is affected.
- Version 7.6.2 is affected.
- Version 7.7.1 is affected.
- Version 7.7.2 is affected.
- Version 6.9.1 is affected.
- Version 6.9.2 is affected.
- Version 7.8.1 is affected.
- Version 7.8.2 is affected.
- Version 7.9.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.