Vulnerability Bulletins

Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability


System information

   
Affected software Cisco

Description

A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An

More info:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20XE%20Software%20NETCONF/RESTCONF%20IPv4%20Access%20Control%20List%20Bypass%20Vulnerability&vs_k=1

Standar resources

Property Value
CVE CVE-2024-20316.

Version history

Version Comments Date
Ministerio de Defensa
CNI
CCN
CCN-CERT