Cisco SD-WAN vManage Software Vulnerability Could Lead to Denial of Service
CVE-2021-1466
5.4MEDIUM
Summary
A vulnerability in the vDaemon service associated with Cisco's SD-WAN vManage Software allows an authenticated local attacker to exploit a buffer overflow condition. This issue arises from incomplete bounds checks on the data provided to the vDaemon service. By sending specially crafted malicious data to the vDaemon listening service, an attacker can induce a failure in the service, leading to a denial of service (DoS) state. Cisco has issued software updates to remediate this vulnerability, and there are currently no alternative workarounds available.
Affected Version(s)
Cisco Catalyst SD-WAN Manager 19.2.1
Cisco Catalyst SD-WAN Manager 18.4.4
Cisco Catalyst SD-WAN Manager 20.1.1.1
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved