First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP
Credit: CVE-2021-1273: This vulnerability was found by Joseph Connor Cisco during internal security testingCVE-2021-1274: This vulnerability was found by Arthur Vidineyev Cisco during internal security testingCVE-2021-1278: This vulnerability was found by Andrew Kim Cisco during internal security testingCVE-2021-1279: CVE-2021-1241: This vulnerability were found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution | =20.4<20.4.1=20.3<20.3.1>=19.3<=20.1<20.1.2=19.2<19.2.4>=.3<18=18.3<=18.4<18.4.6 | 20.4.1 20.3.1 20.1.2 19.2.4 18.4.6 |
Cisco IOS XE SD-WAN Releases | >=16.9=16.10=16.11<=16.12<16.12.4 | 16.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-sdwan-dosmulti-48jJuEUP is critical due to the potential for denial of service attacks.
To fix cisco-sa-sdwan-dosmulti-48jJuEUP, upgrade your affected Cisco SD-WAN and IOS XE SD-WAN products to the recommended software versions.
Affected products include various versions of Cisco SD-WAN and IOS XE SD-WAN releases.
Yes, cisco-sa-sdwan-dosmulti-48jJuEUP can be exploited by an unauthenticated remote attacker.
There are no specific workarounds for cisco-sa-sdwan-dosmulti-48jJuEUP; updating the software is recommended.