Executive Risk Summary
"A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition by forwarding BOOTP packets between VLANs. This vulnerability can be exploited with either unicast or broadcast BOOTP packets, potentially leading to high CPU utilization and making the device unreachable."
Anticipated Attack Path
- 1. An attacker sends BOOTP request packets to an affected Cisco IOS XE device.
- 2. The device improperly handles the BOOTP packets, allowing them to be forwarded between VLANs.
- 3. The attacker exploits this vulnerability to cause a DoS condition, potentially leading to high CPU utilization and device unreachability.
Am I Vulnerable?
- Is your Cisco IOS XE Software version affected by this vulnerability?
- Are your Cisco Catalyst 9000 Series Switches configured to use the DHCP snooping feature?
- Have you implemented workarounds or patches to address this vulnerability?
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Potential disruption to network services during patch application
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly