Vulnerabilites related to cisco - catalyst_c6800-sup6t
CVE-2024-20276 (GCVE-0-2024-20276)
Vulnerability from cvelistv5
Published
2024-03-27 16:51
Modified
2024-08-01 21:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-248 - Uncaught Exception
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.
This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20276", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-29T17:13:32.148354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:11.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ios-dos-Hq4d3tZG", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "15.5(1)SY5" }, { "status": "affected", "version": "15.5(1)SY6" }, { "status": "affected", "version": "15.5(1)SY7" }, { "status": "affected", "version": "15.5(1)SY8" }, { "status": "affected", "version": "15.5(1)SY9" }, { "status": "affected", "version": "15.5(1)SY10" }, { "status": "affected", "version": "15.5(1)SY11" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "Uncaught Exception", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T16:51:46.937Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ios-dos-Hq4d3tZG", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG" } ], "source": { "advisory": "cisco-sa-ios-dos-Hq4d3tZG", "defects": [ "CSCwf55936" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20276", "datePublished": "2024-03-27T16:51:46.937Z", "dateReserved": "2023-11-08T15:08:07.625Z", "dateUpdated": "2024-08-01T21:52:31.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-03-27 17:15
Modified
2025-08-05 14:44
Severity ?
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.
This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 15.5\(1\)sy5 | |
cisco | ios | 15.5\(1\)sy6 | |
cisco | ios | 15.5\(1\)sy7 | |
cisco | ios | 15.5\(1\)sy8 | |
cisco | ios | 15.5\(1\)sy9 | |
cisco | ios | 15.5\(1\)sy10 | |
cisco | ios | 15.5\(1\)sy11 | |
cisco | catalyst_6503-e | - | |
cisco | catalyst_6504-e | - | |
cisco | catalyst_6506-e | - | |
cisco | catalyst_6509-e | - | |
cisco | catalyst_6509-v-e | - | |
cisco | catalyst_6513-e | - | |
cisco | catalyst_6807-xl | - | |
cisco | catalyst_c6800-sup6t | - | |
cisco | catalyst_c6800-sup6t-xl | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*", "matchCriteriaId": "727E596A-295D-4D70-810A-436FC6A4415D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*", "matchCriteriaId": "368210A0-CC15-4FB9-8334-4ED475523C2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*", "matchCriteriaId": "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*", "matchCriteriaId": "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*", "matchCriteriaId": "1C258F34-C557-4586-A8D0-590EC37E252E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*", "matchCriteriaId": "AD456B15-1AFC-470A-9750-E6D152869FB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*", "matchCriteriaId": "3B940A51-E9B1-430B-A732-F1B65F54CD2D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F202892E-2E58-4D77-B983-38AFA51CDBC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE25114-ABBC-47A0-9C20-E8D40D721313", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADD5F49-2817-40EC-861C-C922825708BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AFF899C-1EB3-46D8-9003-EA36A68C90B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8668D34-096B-4FC3-B9B1-0ECFD6265778", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_6807-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC15C966-394F-4582-AF70-5FA64AA45A04", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_c6800-sup6t:-:*:*:*:*:*:*:*", "matchCriteriaId": "21ECB9B9-92C1-45B4-91A9-A1400C7F97F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_c6800-sup6t-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9576310-4AF7-43A0-B296-D3068406C847", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en el software Cisco IOS para los conmutadores Cisco Catalyst serie 6000 podr\u00eda permitir que un atacante adyacente no autenticado provoque que un dispositivo afectado se recargue inesperadamente. Esta vulnerabilidad se debe a un manejo inadecuado del tr\u00e1fico de conmutaci\u00f3n de procesos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico manipulado a un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante hacer que el dispositivo afectado se recargue, lo que resultar\u00eda en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2024-20276", "lastModified": "2025-08-05T14:44:12.760", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-03-27T17:15:51.513", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-248" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }