{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:41:50.955","vulnerabilities":[{"cve":{"id":"CVE-2024-20276","sourceIdentifier":"psirt@cisco.com","published":"2024-03-27T17:15:51.513","lastModified":"2025-08-05T14:44:12.760","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.\r\n\r This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition."},{"lang":"es","value":"Una vulnerabilidad en el software Cisco IOS para los conmutadores Cisco Catalyst serie 6000 podría permitir que un atacante adyacente no autenticado provoque que un dispositivo afectado se recargue inesperadamente. Esta vulnerabilidad se debe a un manejo inadecuado del tráfico de conmutación de procesos. Un atacante podría aprovechar esta vulnerabilidad enviando tráfico manipulado a un dispositivo afectado. Un exploit exitoso podría permitir al atacante hacer que el dispositivo afectado se recargue, lo que resultaría en una condición de denegación de servicio (DoS)."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-248"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*","matchCriteriaId":"727E596A-295D-4D70-810A-436FC6A4415D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*","matchCriteriaId":"368210A0-CC15-4FB9-8334-4ED475523C2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*","matchCriteriaId":"D37EF429-EE6B-4A72-9D76-4FC1E6E19E01"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*","matchCriteriaId":"9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*","matchCriteriaId":"1C258F34-C557-4586-A8D0-590EC37E252E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*","matchCriteriaId":"AD456B15-1AFC-470A-9750-E6D152869FB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*","matchCriteriaId":"3B940A51-E9B1-430B-A732-F1B65F54CD2D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*","matchCriteriaId":"F202892E-2E58-4D77-B983-38AFA51CDBC6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*","matchCriteriaId":"7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*","matchCriteriaId":"0BE25114-ABBC-47A0-9C20-E8D40D721313"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*","matchCriteriaId":"FADD5F49-2817-40EC-861C-C922825708BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*","matchCriteriaId":"4AFF899C-1EB3-46D8-9003-EA36A68C90B3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*","matchCriteriaId":"D8668D34-096B-4FC3-B9B1-0ECFD6265778"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_6807-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"AC15C966-394F-4582-AF70-5FA64AA45A04"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_c6800-sup6t:-:*:*:*:*:*:*:*","matchCriteriaId":"21ECB9B9-92C1-45B4-91A9-A1400C7F97F5"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_c6800-sup6t-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"B9576310-4AF7-43A0-B296-D3068406C847"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}