First published: Thu Jul 16 2020(Updated: )
A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of fields in Cisco SD-WAN peering messages that are encapsulated in UDP packets. An attacker could exploit this vulnerability by sending crafted UDP messages to the targeted system. A successful exploit could allow the attacker to cause services on the device to fail, resulting in a DoS condition that could impact the targeted device and other devices that depend on it.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <17.2.7 | |
Cisco Sd-wan Firmware | >=17.2.8<18.3.0 | |
Cisco Vedge 100 | ||
Cisco Vedge 1000 | ||
Cisco Vedge 100b | ||
Cisco Vedge 100m | ||
Cisco Vedge 100wm | ||
Cisco Vedge 2000 | ||
Cisco Vedge 5000 | ||
Cisco Vedge Cloud Router | ||
Cisco Vsmart Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN Solution Software vulnerability is CVE-2020-3351.
CVE-2020-3351 has a severity rating of 8.6 (high).
CVE-2020-3351 allows an unauthenticated remote attacker to cause a DoS condition by exploiting improper validation of fields in Cisco SD-WAN peering messages encapsulated in UDP packets.
Cisco SD-WAN Solution Software with versions up to 17.2.7 and between 17.2.8 to 18.3.0 are affected by CVE-2020-3351.
To fix CVE-2020-3351, it is recommended to upgrade to a version of Cisco SD-WAN Solution Software that is not vulnerable.