Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-20309
Analyzed
More InfoOfficial Page
Source-psirt@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-27 Mar, 2024 | 17:15
Updated At-30 Jul, 2025 | 13:54

A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding. This vulnerability is due to the incorrect handling of specific ingress traffic when flow control hardware is enabled on the AUX port. An attacker could exploit this vulnerability by reverse telnetting to the AUX port and sending specific data after connecting. A successful exploit could allow the attacker to cause the device to reset or stop responding, resulting in a denial of service (DoS) condition.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Cisco Systems, Inc.
cisco
>>ios_xe>>3.2.0se
cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.2.1se
cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.2.2se
cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.2.3se
cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.0se
cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.0sq
cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.1se
cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.1sq
cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.2se
cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.3se
cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.4se
cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.3.5se
cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.4.0sq
cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.4.1sq
cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.0sq
cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.1sq
cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.2sq
cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.3sq
cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.4sq
cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.5sq
cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.6sq
cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.7sq
cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.5.8sq
cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.6.2ae
cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.6.2e
cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.6.5be
cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.6.7be
cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.6.9e
cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.6.10e
cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.0bs
cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.0s
cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.1as
cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.1s
cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.2s
cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.2ts
cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.3s
cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.4as
cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.4s
cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.5s
cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.6s
cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.7.7s
cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.8.0s
cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.8.1s
cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.8.2s
cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.9.0as
cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.9.0s
cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.9.1as
cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.9.1s
cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.9.2s
cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>3.10.0s
cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-828Secondarypsirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8fpsirt@cisco.com
Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8faf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found