Boletines de Vulnerabilidades

Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability


Información sobre el sistema

   
Software afectado Cisco

Descripción

A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An

More info:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20XE%20Software%20NETCONF/RESTCONF%20IPv4%20Access%20Control%20List%20Bypass%20Vulnerability&vs_k=1

Identificadores estándar

Propiedad Valor
CVE CVE-2024-20316.

Histórico de versiones

Versión Comentario Fecha

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT