CVE-2024-20373

Cisco IOS and Cisco IOS XE SNMP Extended ACL Bypass Vulnerability

Description

A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.  This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials. SNMP with IPv6 ACL configurations is not affected. For more information, see the section of this advisory.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.07%
Vendor Advisory cisco.com
Affected: Cisco Cisco IOS XE Catalyst SD-WAN
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-20373?
CVE-2024-20373 has been scored as a medium severity vulnerability.
How to fix CVE-2024-20373?
To fix CVE-2024-20373, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-20373 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-20373 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-20373?
CVE-2024-20373 affects Cisco Cisco IOS XE Catalyst SD-WAN.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.