A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
21 Mar 2024, 20:02
Type | Values Removed | Values Added |
---|---|---|
CPE |
16 Oct 2023, 16:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | |
First Time |
Cisco catalyst Sd-wan Manager
|
27 Aug 2021, 13:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:vedge-cloud_firmware:-:*:*:*:*:*:*:* |
cpe:2.3:o:cisco:vedge_cloud_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:* |
13 May 2021, 19:43
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
CPE | cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge-cloud_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100m_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_5000_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vsmart_controller_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge-cloud:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge-100b_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_1000_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100wm_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_2000_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vsmart_controller:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:* |
06 May 2021, 13:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-06 13:15
Updated : 2024-03-21 20:02
NVD link : CVE-2021-1513
Mitre link : CVE-2021-1513
CVE.ORG link : CVE-2021-1513
JSON object : View
Products Affected
cisco
- catalyst_sd-wan_manager
- vedge_2000
- vsmart_controller
- vedge_100b_firmware
- vedge_cloud_firmware
- vedge_100wm
- sd-wan_vbond_orchestrator
- vedge_1000
- vedge_5000
- vedge_100m
- vedge-100b_firmware
- vedge_cloud
- vsmart_controller_firmware
- vedge_100wm_firmware
- vedge_100_firmware
- vedge_100m_firmware
- vedge_2000_firmware
- vedge_100b
- vedge_1000_firmware
- vedge_5000_firmware
- vedge-100b
- vedge_100
CWE
CWE-20
Improper Input Validation