First published: Wed Mar 24 2021(Updated: )
A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwdos-4zeEeC9w This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found by James Spadaro III Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-sdwdos-4zeEeC9w is high due to its potential to cause a denial of service condition.
To fix cisco-sa-iosxe-sdwdos-4zeEeC9w, update to the latest version of Cisco IOS XE SD-WAN Software that contains the necessary patches.
Cisco-sa-iosxe-sdwdos-4zeEeC9w mitigates denial of service (DoS) attacks by addressing insufficient handling of malformed packets.
Users of Cisco IOS XE SD-WAN Software are affected by cisco-sa-iosxe-sdwdos-4zeEeC9w.
No, authentication is not required to exploit cisco-sa-iosxe-sdwdos-4zeEeC9w, making it particularly vulnerable.