Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial of service (DoS).
This high-severity vulnerability, which has a base score of 7.4 and is tracked as CVE-2024-20276, is triggered by improper handling of process-switched traffic.
Cisco IOS (Internetwork Operating System) is a set of proprietary operating systems (OSes) that run on Cisco Systems hardware, such as routers, switches, and other network devices.
Cisco IOS comprises essential functionalities such as interface configuration, network management and monitoring, routing, security, switching, and quality of service (QoS).
This Cisco IOS Software flaw for Cisco Catalyst 6000 Series switches could allow an unauthenticated, local attacker to force an unexpected reload on a vulnerable device.
The vulnerability stems from the improper handling of process-switched traffic.
An attacker may take advantage of this flaw by directing malicious traffic to a vulnerable device.
If the exploit is effective, the attacker could trigger a denial of service (DoS) issue by forcing the compromised device to reload.
“An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition”, Cisco said in its advisory.
Suppose any of the following Cisco products are running a vulnerable version of the Cisco IOS software and have activated port security, device classifier, or authentication, authorization, and accounting (AAA). In that case, they are susceptible to this vulnerability:
Use the show running-config | include interface|port-security command to find out if a device has port security setup.
This vulnerability affects a device if port security is enabled on an interface.
Use the show running-config | include device classifier command to see if a device has device classifier configured.
The device is susceptible to this vulnerability if the command returns output.
Use the show running-config | include system-auth-control|interface|port-control|mab command to find out if a device is configured with AAA.
This vulnerability affects a device if AAA is enabled on the interface.
The following Cisco products are unaffected by this issue, according to Cisco
Cisco has verified that the following Cisco IOS platforms are unaffected by this vulnerability:
There are no workarounds to address this vulnerability. Users are encouraged to upgrade to the appropriate fixed software release to mitigate the risk posed by this vulnerability.
Cisco has made these updates free for customers with service contracts, accessible through their usual update channels.
For customers without service contracts, upgrades can be obtained by contacting the Cisco Technical Assistance Center (TAC), with the product serial number and the URL of the advisory as evidence of entitlement to a free upgrade.
Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here
It’s clear that a person’s reputation is increasingly influenced by their online presence, which spans…
Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as…
Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel…
Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source…
Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams to…
Microsoft has announced that it is currently blocking an astounding 7,000 password attacks every second,…