DoS via Unvalidated IS-IS Packets in Cisco IOS XR Segment Routing
CVE-2024-20406 Published on September 11, 2024
Cisco IOS XR Software Intermediate System-to-Intermediate System Denial of Service Vulnerability
A vulnerability in the segment routing feature for the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending specific IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process on all affected devices that are participating in the Flexible Algorithm to crash and restart, resulting in a DoS condition.
Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency. This vulnerability affects segment routing for IS-IS over IPv4 and IPv6 control planes as well as devices that are configured as level 1, level 2, or multi-level routing IS-IS type.
Vulnerability Analysis
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Products Associated with CVE-2024-20406
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-20406 are published in Cisco Ios Xr:
Affected Versions
Cisco IOS XR Software:- Version 7.4.1 is affected.
- Version 6.8.1 is affected.
- Version 7.4.15 is affected.
- Version 7.5.1 is affected.
- Version 7.4.16 is affected.
- Version 7.6.1 is affected.
- Version 7.5.2 is affected.
- Version 7.8.1 is affected.
- Version 7.6.15 is affected.
- Version 7.5.12 is affected.
- Version 7.7.1 is affected.
- Version 6.8.2 is affected.
- Version 7.4.2 is affected.
- Version 6.9.1 is affected.
- Version 7.6.2 is affected.
- Version 7.5.3 is affected.
- Version 7.7.2 is affected.
- Version 6.9.2 is affected.
- Version 7.9.1 is affected.
- Version 7.10.1 is affected.
- Version 7.8.2 is affected.
- Version 7.5.4 is affected.
- Version 7.8.22 is affected.
- Version 7.7.21 is affected.
- Version 7.9.2 is affected.
- Version 7.5.5 is affected.
- Version 7.11.1 is affected.
- Version 7.9.21 is affected.
- Version 7.10.2 is affected.
- Version 7.6.3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.