Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability
|
System information
|
|
|
Affected software |
Cisco |
Description
|
A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An
More info:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20XE%20Software%20NETCONF/RESTCONF%20IPv4%20Access%20Control%20List%20Bypass%20Vulnerability&vs_k=1 |
Standar resources
|
Property |
Value |
CVE |
CVE-2024-20316. |