Vulnslist

find the latest Cisco vulnerabilities

Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability

cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn · High · Published · Updated

A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn This advisory is part of the August 2024 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2024 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Workarounds

There are no workarounds that address this vulnerability.

For devices that have the DHCP feature enabled, there may be a mitigation for this vulnerability. If the DHCPv6 relay agent functionality is not required, use the no ipv6 dhcp relay configuration command at the device CLI to disable the DHCPv6 relay agent.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2024-20446
Cisco Bug IDsCSCvz72834, CSCwk27906
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco NX-OS Software 8.2(11), Cisco NX-OS Software 9.3(9), Cisco NX-OS Software 10.2(1), Cisco NX-OS Software 10.2(1q), Cisco NX-OS Software, Cisco Nexus 7000 Series Switches, Cisco Nexus 3000 Series Switches, Cisco Nexus 9000 Series Switches

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2024-20446 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2024-20446 Cisco OpenVuln
Cisco Firepower Extensible Operating System (FXOS) CVE-2024-20446 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2024-20446 Cisco OpenVuln
Cisco Nexus 9000 Series Switches CVE-2024-20446 Cisco OpenVuln
Cisco Nexus 7000 Series Switches CVE-2024-20446 Cisco OpenVuln
Cisco Nexus 3000 Series Switches CVE-2024-20446 Cisco OpenVuln
Cisco Nexus 3000 Series Switch CVE-2024-20446 Cisco OpenVuln
Cisco NX-OS Software CVE-2024-20446 Cisco OpenVuln