This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18030 | A vulnerability in the access control list (ACL) processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL. |
Tue, 15 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco ios Xr Software |
|
| CPEs | cpe:2.3:o:cisco:ios_xr_software:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Cisco
Cisco ios Xr Software |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-04-15T15:19:04.071Z
Reserved: 2023-11-08T15:08:07.632Z
Link: CVE-2024-20315
Updated: 2024-08-01T21:59:41.535Z
Status : Deferred
Published: 2024-03-13T17:15:47.607
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-20315
No data.
OpenCVE Enrichment
No data.
EUVD