First published: Wed Jul 18 2018(Updated: )
A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checks for certain values in packets that are sent to the Zero Touch Provisioning service of the affected software. An attacker could exploit this vulnerability by sending malicious packets to the affected software for processing. When the software processes the packets, a buffer overflow condition could occur and cause an affected device to reload. A successful exploit could allow the attacker to cause a temporary DoS condition while the device reloads. This vulnerability can be exploited only by traffic that is destined for an affected device. It cannot be exploited by traffic that is transiting a device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180718-sdwan-dos is rated as high due to its potential to cause a denial of service condition.
To fix cisco-sa-20180718-sdwan-dos, update your Cisco SD-WAN Solution to the latest firmware version as recommended by Cisco.
The vulnerability cisco-sa-20180718-sdwan-dos is caused by incorrect bounds checks on certain values in packets processed by the Zero Touch Provisioning service.
The cisco-sa-20180718-sdwan-dos vulnerability affects the Cisco SD-WAN Solution.
Yes, cisco-sa-20180718-sdwan-dos can be exploited remotely by an unauthenticated attacker.