Lucene search

K
ciscoCiscoCISCO-SA-SDWAN-DOS-CKN5CVQW
HistoryMay 05, 2021 - 4:00 p.m.

Cisco SD-WAN Software vDaemon Denial of Service Vulnerability

2021-05-0516:00:00
tools.cisco.com
44
cisco
sd-wan
vdaemon
denial of service
vulnerability
remote attacker
dos condition
malformed packets
software updates
crafted traffic

EPSS

0.002

Percentile

52.6%

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition.

This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW”]

Affected configurations

Vulners
Node
ciscosd-wan_solutionMatchany
OR
ciscosd-wan_vmanageMatchany
OR
ciscosd-wan_vedge_routerMatchany
OR
ciscosd-wan_vedge_cloudMatchany
OR
ciscosd-wanMatchany
OR
ciscosd-wan_solutionMatchany
OR
ciscosd-wan_vmanageMatchany
OR
ciscosd-wan_vedge_routerMatchany
OR
ciscosd-wan_vedge_cloudMatchany
OR
ciscosd-wanMatchany
VendorProductVersionCPE
ciscosd-wan_solutionanycpe:2.3:a:cisco:sd-wan_solution:any:*:*:*:*:*:*:*
ciscosd-wan_vmanageanycpe:2.3:a:cisco:sd-wan_vmanage:any:*:*:*:*:*:*:*
ciscosd-wan_vedge_routeranycpe:2.3:a:cisco:sd-wan_vedge_router:any:*:*:*:*:*:*:*
ciscosd-wan_vedge_cloudanycpe:2.3:a:cisco:sd-wan_vedge_cloud:any:*:*:*:*:*:*:*
ciscosd-wananycpe:2.3:a:cisco:sd-wan:any:*:*:*:*:*:*:*

EPSS

0.002

Percentile

52.6%

Related for CISCO-SA-SDWAN-DOS-CKN5CVQW