Cisco SD-WAN vManage Software Vulnerability Could Lead to Denial of Service
CVE-2021-1466

5.4MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
15 November 2024

Summary

A vulnerability in the vDaemon service associated with Cisco's SD-WAN vManage Software allows an authenticated local attacker to exploit a buffer overflow condition. This issue arises from incomplete bounds checks on the data provided to the vDaemon service. By sending specially crafted malicious data to the vDaemon listening service, an attacker can induce a failure in the service, leading to a denial of service (DoS) state. Cisco has issued software updates to remediate this vulnerability, and there are currently no alternative workarounds available.

Affected Version(s)

Cisco Catalyst SD-WAN Manager 19.2.1

Cisco Catalyst SD-WAN Manager 18.4.4

Cisco Catalyst SD-WAN Manager 20.1.1.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.