First published: Wed Sep 25 2024(Updated: )
A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vEdge, vBond, and vSmart Software Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20496 has a High severity rating, indicating it can potentially lead to significant impacts on system availability.
To mitigate CVE-2024-20496, Cisco recommends updating to the latest version of Cisco SD-WAN vEdge Software where the vulnerability has been addressed.
CVE-2024-20496 affects the Cisco SD-WAN vEdge Software, specifically those versions vulnerable to the identified packet validation issue.
CVE-2024-20496 cannot be exploited remotely as it requires an unauthenticated, adjacent attacker to leverage the vulnerability.
The potential impact of CVE-2024-20496 is a denial of service (DoS) condition, which can disrupt the availability of the affected Cisco SD-WAN systems.