Vulnerabilities > Cisco

DATE CVE VULNERABILITY TITLE RISK
2024-09-25 CVE-2024-20510 Incorrect Authorization vulnerability in Cisco IOS XE
A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication. This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server.
low complexity
cisco CWE-863
critical
9.3
2024-09-12 CVE-2024-20430 Uncontrolled Search Path Element vulnerability in Cisco Meraki Systems Manager
A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges.  This vulnerability is due to incorrect handling of directory search paths at runtime.
local
low complexity
cisco CWE-427
7.3
2024-09-11 CVE-2024-20304 Memory Leak vulnerability in Cisco IOS XR
A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device. This vulnerability exists because the Mtrace2 code does not properly handle packet memory.
network
low complexity
cisco CWE-401
7.5
2024-09-11 CVE-2024-20317 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the handling of specific Ethernet frames by Cisco IOS XR Software for various Cisco Network Convergence System (NCS) platforms could allow an unauthenticated, adjacent attacker to cause critical priority packets to be dropped, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect classification of certain types of Ethernet frames that are received on an interface.
low complexity
cisco
7.4
2024-09-11 CVE-2024-20343 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to read any file in the file system of the underlying Linux operating system.
local
low complexity
cisco
5.5
2024-09-11 CVE-2024-20381 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.  This vulnerability is due to improper authorization checks on the API.
network
low complexity
cisco
8.8
2024-09-11 CVE-2024-20390 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the Dedicated XML Agent feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on XML TCP listen port 38751. This vulnerability is due to a lack of proper error validation of ingress XML packets.
network
low complexity
cisco
5.3
2024-09-11 CVE-2024-20398 OS Command Injection vulnerability in Cisco IOS XR
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to obtain read/write file system access on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands.
local
low complexity
cisco CWE-78
7.8
2024-09-11 CVE-2024-20406 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the segment routing feature for the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of ingress IS-IS packets.
low complexity
cisco
7.4
2024-09-11 CVE-2024-20483 OS Command Injection vulnerability in Cisco IOS XR
Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root. These vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands.
network
low complexity
cisco CWE-78
7.2