First published: Wed Aug 07 2019(Updated: )
A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-sd-wan-bypass
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190807-sd-wan-bypass is considered high due to its potential to allow unauthorized remote access.
To fix cisco-sa-20190807-sd-wan-bypass, you should update to the latest version of the Cisco SD-WAN Solution firmware that addresses this vulnerability.
Attackers can leverage cisco-sa-20190807-sd-wan-bypass to bypass L3 and L4 traffic filters, potentially gaining unauthorized access to sensitive data or systems.
The vulnerability cisco-sa-20190807-sd-wan-bypass affects Cisco SD-WAN Solution devices running an affected firmware version.
No, exploitation of cisco-sa-20190807-sd-wan-bypass does not require authentication, making it particularly concerning.