First published: Wed Sep 25 2024(Updated: )
A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software | ||
Cisco Catalyst SD-WAN Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sdwan-utd-dos-hDATqxs is classified as high due to the potential for denial of service attacks.
To fix cisco-sa-sdwan-utd-dos-hDATqxs, it is recommended to update the affected Cisco IOS XE Software to the latest patched version.
Cisco IOS XE Software running in controller mode and Cisco Catalyst SD-WAN Routers are affected by cisco-sa-sdwan-utd-dos-hDATqxs.
Cisco-sa-sdwan-utd-dos-hDATqxs facilitates a denial of service (DoS) attack that can disrupt service on the affected devices.
No, cisco-sa-sdwan-utd-dos-hDATqxs can be exploited by an unauthenticated remote attacker.