CVE-2024-20276

A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ios:15.5\(1\)sy5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy6:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy8:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy11:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6807-xl:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_c6800-sup6t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_c6800-sup6t-xl:-:*:*:*:*:*:*:*

History

05 Aug 2025, 14:44

Type Values Removed Values Added
First Time Cisco catalyst C6800-sup6t
Cisco catalyst C6800-sup6t-xl
Cisco
Cisco catalyst 6506-e
Cisco catalyst 6504-e
Cisco catalyst 6513-e
Cisco catalyst 6509-v-e
Cisco catalyst 6503-e
Cisco catalyst 6807-xl
Cisco catalyst 6509-e
Cisco ios
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZGĀ - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZGĀ - Vendor Advisory
CPE cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy9:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy8:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6807-xl:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy6:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy10:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_c6800-sup6t:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_c6800-sup6t-xl:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(1\)sy11:*:*:*:*:*:*:*

27 Mar 2024, 17:48

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 17:15

Updated : 2025-08-05 14:44


NVD link : CVE-2024-20276

Mitre link : CVE-2024-20276


JSON object : View

Products Affected

cisco

  • catalyst_6503-e
  • catalyst_6513-e
  • catalyst_6807-xl
  • ios
  • catalyst_6509-e
  • catalyst_c6800-sup6t
  • catalyst_6509-v-e
  • catalyst_6504-e
  • catalyst_6506-e
  • catalyst_c6800-sup6t-xl
CWE

No CWE.