7.8

CVE-2021-1513

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoCatalyst Sd-wan Manager Version < 20.3.1
CiscoCatalyst Sd-wan Manager Version >= 20.4 < 20.4.1
CiscoCatalyst Sd-wan Manager Version >= 20.5 < 20.5.1
CiscoVsmart Controller Firmware Version-
   CiscoVsmart Controller Version-
CiscoVedge 100 Firmware Version-
   CiscoVedge 100 Version-
CiscoVedge 1000 Firmware Version-
   CiscoVedge 1000 Version-
CiscoVedge 100b Firmware Version-
   CiscoVedge 100b Version-
CiscoVedge 100m Firmware Version-
   CiscoVedge 100m Version-
CiscoVedge 100wm Firmware Version-
   CiscoVedge 100wm Version-
CiscoVedge 2000 Firmware Version-
   CiscoVedge 2000 Version-
CiscoVedge 5000 Firmware Version-
   CiscoVedge 5000 Version-
CiscoVedge-100b Firmware Version-
   CiscoVedge-100b Version-
CiscoVedge Cloud Firmware Version-
   CiscoVedge Cloud Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.82% 0.731
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
psirt@cisco.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.