CVE-2024-20446

8.6 HIGH

📋 TL;DR

An unauthenticated remote attacker can send a specially crafted DHCPv6 packet to cause the dhcp_snoop process to crash repeatedly, leading to device reload and denial of service. This affects Cisco NX-OS devices with DHCPv6 relay agent functionality enabled. Network administrators using affected Cisco switches/routers are impacted.

💻 Affected Systems

Products:
  • Cisco Nexus 3000 Series Switches
  • Cisco Nexus 9000 Series Switches in standalone NX-OS mode
  • Cisco Nexus 9500 R-Series Line Cards and Fabric Modules
Versions: Multiple NX-OS versions - see Cisco advisory for specific affected versions
Operating Systems: Cisco NX-OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DHCPv6 relay agent feature is enabled. Devices without DHCPv6 relay configuration are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device reload causing extended network outage, affecting all services running on the device

🟠

Likely Case

Device reload causing temporary service disruption until process restarts

🟢

If Mitigated

Minimal impact if workarounds are implemented or vulnerable feature is disabled

🌐 Internet-Facing: HIGH - Attackers can send crafted packets to any IPv6 address on the device from the internet
🏢 Internal Only: HIGH - Internal attackers can also exploit this vulnerability without authentication

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted DHCPv6 packets to any IPv6 address on the device. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions available - refer to Cisco advisory for specific version mapping

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn

Restart Required: Yes

Instructions:

1. Check current NX-OS version. 2. Download appropriate fixed software from Cisco. 3. Follow Cisco NX-OS upgrade procedures. 4. Reboot device after upgrade.

🔧 Temporary Workarounds

Disable DHCPv6 Relay Agent

cisco-nxos

Disable the DHCPv6 relay agent feature if not required

no ipv6 dhcp relay
no ipv6 dhcp relay information option

🧯 If You Can't Patch

  • Implement ACLs to block DHCPv6 traffic from untrusted sources
  • Disable IPv6 on interfaces where not required or use IPv4-only networks

🔍 How to Verify

Check if Vulnerable:

Check if DHCPv6 relay is configured: 'show running-config | include dhcp' and check NX-OS version

Check Version:

show version | include NXOS

Verify Fix Applied:

Verify NX-OS version is patched and DHCPv6 relay configuration is present without crashes

📡 Detection & Monitoring

Log Indicators:

  • dhcp_snoop process crashes
  • Device reload messages
  • DHCPv6 packet parsing errors

Network Indicators:

  • Unusual DHCPv6 traffic patterns
  • Crafted DHCPv6 RELAY-REPLY messages

SIEM Query:

source="nxos" AND ("dhcp_snoop" OR "RELOAD") AND ("crash" OR "restart")

🔗 References

📤 Share & Export