5.5

CVE-2022-20717

A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoSd-wan Vedge Router Version <= 20.6
   Cisco1100 Integrated Services Router Version-
   CitrixSd-wan 1000 Version-
   CitrixSd-wan 110 Version-
   CitrixSd-wan 1100 Version-
   CitrixSd-wan 2000 Version-
   CitrixSd-wan 210 Version-
   CitrixSd-wan 2100 Version-
   CitrixSd-wan 5100 Version-
CiscoSd-wan Vedge Router Version20.7
   Cisco1100 Integrated Services Router Version-
   CitrixSd-wan 1000 Version-
   CitrixSd-wan 110 Version-
   CitrixSd-wan 1100 Version-
   CitrixSd-wan 2000 Version-
   CitrixSd-wan 210 Version-
   CitrixSd-wan 2100 Version-
   CitrixSd-wan 5100 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.182
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
psirt@cisco.com 5.5 1.8 3.6
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

CWE-789 Memory Allocation with Excessive Size Value

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.