First published: Thu Mar 19 2020(Updated: )
A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <18.4.5 | |
Cisco SD-WAN | >=19.2.0<19.2.2 | |
Cisco SD-WAN | =20.1.0 | |
Cisco SD-WAN | =20.3.0 | |
Cisco vEdge Cloud | ||
Cisco vManage Network Management | ||
Cisco SD-WAN vSmart Controller | ||
Cisco 1100-4g/6g Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco vEdge 100 Router | ||
Cisco vEdge 1000 Router | ||
Cisco vEdge 100b Router | ||
Cisco vEdge 100m router | ||
Cisco vEdge 100wm router | ||
Cisco vEdge 2000 router | ||
Cisco vEdge-5000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN Solution software vulnerability is CVE-2020-3264.
An attacker can exploit this vulnerability by sending crafted traffic to an affected device.
The severity rating of CVE-2020-3264 is 7.1, which is considered high.
The versions affected by this vulnerability are 18.4.5, 19.2.0 to 19.2.2, 20.1.0, and 20.3.0.
No, the Cisco Vedge Cloud Router, Cisco Vmanage Network Management System, and Cisco Vsmart Controller are not vulnerable to this vulnerability.