First published: Wed Jul 15 2020(Updated: )
A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted packets through an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV
Credit: Gil Fidel Accenture Security
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vEdge Router | >=19.3<=20.1<20.1.1=19.2<19.2.3>=.3<18=18.3<=18.4<18.4.5 | 20.1.1 19.2.3 18.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN vEdge Routers vulnerability is cisco-sa-vedgfpdos-PkqQrnwV.
The severity of cisco-sa-vedgfpdos-PkqQrnwV is high with a CVSS score of 7.4.
This vulnerability could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.
Versions 19.3 up to but excluding 20.1.1, version 19.2 up to but excluding 19.2.3, and versions 18.4 up to but excluding 18.4.5 of Cisco SD-WAN vEdge Router are affected by this vulnerability.
To fix the cisco-sa-vedgfpdos-PkqQrnwV vulnerability, update your Cisco SD-WAN vEdge Router to version 20.1.1, 19.2.3, or 18.4.5 depending on the affected version.