First published: Thu Mar 19 2020(Updated: )
A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <18.4.5 | |
Cisco Sd-wan Firmware | >=19.2.0<19.2.2 | |
Cisco Sd-wan Firmware | =20.1.0 | |
Cisco Sd-wan Firmware | =20.3.0 | |
Cisco Vedge Cloud Router | ||
Cisco Vmanage Network Management System | ||
Cisco Vsmart Controller | ||
Cisco 1100-4g Integrated Services Router | ||
Cisco 1100-4gltegb Integrated Services Router | ||
Cisco 1100-4gltena Integrated Services Router | ||
Cisco 1100-6g Integrated Services Router | ||
Cisco Vedge 100 | ||
Cisco Vedge 1000 | ||
Cisco Vedge 100b | ||
Cisco Vedge 100m | ||
Cisco Vedge 100wm | ||
Cisco Vedge 2000 | ||
Cisco Vedge 5000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN Solution software vulnerability is CVE-2020-3264.
An attacker can exploit this vulnerability by sending crafted traffic to an affected device.
The severity rating of CVE-2020-3264 is 7.1, which is considered high.
The versions affected by this vulnerability are 18.4.5, 19.2.0 to 19.2.2, 20.1.0, and 20.3.0.
No, the Cisco Vedge Cloud Router, Cisco Vmanage Network Management System, and Cisco Vsmart Controller are not vulnerable to this vulnerability.