Логотип exploitDog
bind:CVE-2024-20316
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20316

Количество 3

Количество 3

nvd логотип

CVE-2024-20316

почти 2 года назад

A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-6rx6-h35g-58g2

почти 2 года назад

A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2024-02559

почти 2 года назад

Уязвимость реализации протоколов NETCONF или RESTCONF службы Data Model Interface (DMI) операционных систем Cisco IOS XE, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к ресурсам

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20316

A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.

CVSS3: 5.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-6rx6-h35g-58g2

A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability is due to improper handling of error conditions when a successfully authorized device administrator updates an IPv4 ACL using the NETCONF or RESTCONF protocol, and the update would reorder access control entries (ACEs) in the updated ACL. An attacker could exploit this vulnerability by accessing resources that should have been protected across an affected device.

CVSS3: 5.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02559

Уязвимость реализации протоколов NETCONF или RESTCONF службы Data Model Interface (DMI) операционных систем Cisco IOS XE, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к ресурсам

CVSS3: 5.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу