All the vulnerabilites related to Cisco - Cisco SD-WAN vEdge Router
cve-2021-1461
Vulnerability from cvelistv5
Published
2024-11-18 15:33
Modified
2024-11-18 15:53
Severity ?
EPSS score ?
Summary
Cisco SD-WAN Software Signature Verification Bypass Vulnerability
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 19.2.1 Version: 18.4.4 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 19.2.929 Version: 19.2.31 Version: 19.2.32 Version: 19.2.4 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1461", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T15:52:43.584510Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:53:00.942Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "19.2.4" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "19.1.01" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "19.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Image Signature Verification feature of Cisco\u0026nbsp;SD-WAN Software could allow an authenticated, remote attacker with Administrator-level credentials to install a malicious software patch on an affected device.\r\nThe vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.Cisco\u0026nbsp;has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "Improper Verification of Cryptographic Signature", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:33:06.681Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-sigverbypass-gPYXd6Mk", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the October 2021 release of the Cisco\u0026nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773\"\u003eCisco\u0026nbsp;Event Response: October 2021 Cisco\u0026nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM" } ], "source": { "advisory": "cisco-sa-sdwan-sigverbypass-gPYXd6Mk", "defects": [ "CSCvs92954" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN Software Signature Verification Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1461", "datePublished": "2024-11-18T15:33:06.681Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T15:53:00.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1511
Vulnerability from cvelistv5
Published
2021-05-06 12:42
Modified
2024-11-08 23:19
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge router |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1511", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:17:40.485745Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:19:01.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T12:42:07", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ], "source": { "advisory": "cisco-sa-sdwan-buffover-MWGucjtO", "defect": [ [ "CSCvt11545", "CSCvu28407", "CSCvu28442" ] ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-05-05T16:00:00", "ID": "CVE-2021-1511", "STATE": "PUBLIC", "TITLE": "Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN vEdge router", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ] }, "source": { "advisory": "cisco-sa-sdwan-buffover-MWGucjtO", "defect": [ [ "CSCvt11545", "CSCvu28407", "CSCvu28442" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1511", "datePublished": "2021-05-06T12:42:07.424396Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:19:01.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20496
Vulnerability from cvelistv5
Published
2024-09-25 16:20
Modified
2024-09-25 18:36
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Routers Denial of Service Vulnerability
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge Cloud |
Version: 19.2.1 Version: 20.1.12 Version: 18.4.4 Version: 19.3.0 Version: 18.3.8 Version: 19.2.2 Version: 20.1.1 Version: 18.3.6 Version: 18.4.3 Version: 18.4.302 Version: 18.4.5 Version: 18.4.303 Version: 19.2.098 Version: 19.1.0 Version: 19.0.1a Version: 19.2.099 Version: 18.3.7 Version: 19.2.097 Version: 18.3.1 Version: 19.2.0 Version: 18.3.4 Version: 18.2.0 Version: 18.4.1 Version: 18.4.0 Version: 18.3.5 Version: 18.3.3 Version: 18.3.0 Version: 19.2.3 Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 20.3.2 Version: 19.2.32 Version: 18.4.6 Version: 20.4.1 Version: 19.2.4 Version: 20.4.1.1 Version: 20.3.3 Version: 20.5.1 Version: 20.1.3 Version: 20.4.1.2 Version: 20.4.2 Version: 20.3.4 Version: 20.6.1 Version: 20.6.2 Version: 20.7.1 Version: 20.3.5 Version: 20.6.3 Version: 20.8.1 Version: 20.7.2 Version: 20.6.4 Version: 20.9.1 Version: 20.3.6 Version: 20.9.1.1 Version: 20.9.2 Version: 20.6.5 Version: 20.3.7 Version: 20.9.3 Version: 20.4.2.3 Version: 20.3.4.3 Version: 20.6.4.1 Version: 20.6.3.2 Version: 20.3.5.1 Version: 20.9.3.1 Version: 20.6.5.2 Version: 20.3.7.1 Version: 20.3.3.2 Version: 20.6.1.2 Version: 20.1.3.1 Version: 20.9.2.2 Version: 20.6.5.3 Version: 20.6.3.3 Version: 20.3.7.2 Version: 20.6.5.4 Version: 20.9.2.3 Version: 20.3.8 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20496", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T18:35:59.706749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T18:36:07.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Cloud", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "20.5.1" }, { "status": "affected", "version": "20.1.3" }, { "status": "affected", "version": "20.4.1.2" }, { "status": "affected", "version": "20.4.2" }, { "status": "affected", "version": "20.3.4" }, { "status": "affected", "version": "20.6.1" }, { "status": "affected", "version": "20.6.2" }, { "status": "affected", "version": "20.7.1" }, { "status": "affected", "version": "20.3.5" }, { "status": "affected", "version": "20.6.3" }, { "status": "affected", "version": "20.8.1" }, { "status": "affected", "version": "20.7.2" }, { "status": "affected", "version": "20.6.4" }, { "status": "affected", "version": "20.9.1" }, { "status": "affected", "version": "20.3.6" }, { "status": "affected", "version": "20.9.1.1" }, { "status": "affected", "version": "20.9.2" }, { "status": "affected", "version": "20.6.5" }, { "status": "affected", "version": "20.3.7" }, { "status": "affected", "version": "20.9.3" }, { "status": "affected", "version": "20.4.2.3" }, { "status": "affected", "version": "20.3.4.3" }, { "status": "affected", "version": "20.6.4.1" }, { "status": "affected", "version": "20.6.3.2" }, { "status": "affected", "version": "20.3.5.1" }, { "status": "affected", "version": "20.9.3.1" }, { "status": "affected", "version": "20.6.5.2" }, { "status": "affected", "version": "20.3.7.1" }, { "status": "affected", "version": "20.3.3.2" }, { "status": "affected", "version": "20.6.1.2" }, { "status": "affected", "version": "20.1.3.1" }, { "status": "affected", "version": "20.9.2.2" }, { "status": "affected", "version": "20.6.5.3" }, { "status": "affected", "version": "20.6.3.3" }, { "status": "affected", "version": "20.3.7.2" }, { "status": "affected", "version": "20.6.5.4" }, { "status": "affected", "version": "20.9.2.3" }, { "status": "affected", "version": "20.3.8" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "19.1.01" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "20.1.11" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "20.5.1" }, { "status": "affected", "version": "20.1.3" }, { "status": "affected", "version": "20.4.1.2" }, { "status": "affected", "version": "20.4.2" }, { "status": "affected", "version": "20.3.4" }, { "status": "affected", "version": "20.6.1" }, { "status": "affected", "version": "20.6.2" }, { "status": "affected", "version": "20.7.1" }, { "status": "affected", "version": "20.7.1.2" }, { "status": "affected", "version": "20.3.5" }, { "status": "affected", "version": "20.9.1" }, { "status": "affected", "version": "20.6.3" }, { "status": "affected", "version": "20.8.1" }, { "status": "affected", "version": "20.7.2" }, { "status": "affected", "version": "20.6.4" }, { "status": "affected", "version": "20.3.6" }, { "status": "affected", "version": "20.9.2" }, { "status": "affected", "version": "20.6.5" }, { "status": "affected", "version": "20.3.7" }, { "status": "affected", "version": "20.9.3" }, { "status": "affected", "version": "20.6.5.1" }, { "status": "affected", "version": "20.3.3.2" }, { "status": "affected", "version": "20.6.4.1" }, { "status": "affected", "version": "20.6.3.2" }, { "status": "affected", "version": "20.3.4.3" }, { "status": "affected", "version": "20.6.5.2" }, { "status": "affected", "version": "20.9.3.1" }, { "status": "affected", "version": "20.3.7.1" }, { "status": "affected", "version": "20.3.5.1" }, { "status": "affected", "version": "20.4.2.3" }, { "status": "affected", "version": "20.6.1.2" }, { "status": "affected", "version": "20.9.2.2" }, { "status": "affected", "version": "20.1.3.1" }, { "status": "affected", "version": "20.6.5.3" }, { "status": "affected", "version": "20.6.3.3" }, { "status": "affected", "version": "20.3.7.2" }, { "status": "affected", "version": "20.6.5.4" }, { "status": "affected", "version": "20.9.2.3" }, { "status": "affected", "version": "20.3.8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\r\n\r\nThis vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:20:12.079Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdw-vedos-KqFfhps3", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3" } ], "source": { "advisory": "cisco-sa-sdw-vedos-KqFfhps3", "defects": [ "CSCwd85135" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20496", "datePublished": "2024-09-25T16:20:12.079Z", "dateReserved": "2023-11-08T15:08:07.686Z", "dateUpdated": "2024-09-25T18:36:07.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20717
Vulnerability from cvelistv5
Published
2022-04-15 14:15
Modified
2024-11-06 16:27
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Routers Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge router |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:24:49.363Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20220413 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-20717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T15:59:05.080616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:27:31.894Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2022-04-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-789", "description": "CWE-789", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T14:15:28", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20220413 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB" } ], "source": { "advisory": "cisco-sa-sdwan-vedge-dos-jerVm4bB", "defect": [ [ "CSCvt55609" ] ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2022-04-13T16:00:00", "ID": "CVE-2022-20717", "STATE": "PUBLIC", "TITLE": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN vEdge router", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.5", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-789" } ] } ] }, "references": { "reference_data": [ { "name": "20220413 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB" } ] }, "source": { "advisory": "cisco-sa-sdwan-vedge-dos-jerVm4bB", "defect": [ [ "CSCvt55609" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20717", "datePublished": "2022-04-15T14:15:28.491430Z", "dateReserved": "2021-11-02T00:00:00", "dateUpdated": "2024-11-06T16:27:31.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1510
Vulnerability from cvelistv5
Published
2021-05-06 12:42
Modified
2024-11-08 23:19
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge router |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:17:50.293104Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:19:11.003Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T12:42:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ], "source": { "advisory": "cisco-sa-sdwan-buffover-MWGucjtO", "defect": [ [ "CSCvt11545", "CSCvu28407", "CSCvu28442" ] ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-05-05T16:00:00", "ID": "CVE-2021-1510", "STATE": "PUBLIC", "TITLE": "Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN vEdge router", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ] }, "source": { "advisory": "cisco-sa-sdwan-buffover-MWGucjtO", "defect": [ [ "CSCvt11545", "CSCvu28407", "CSCvu28442" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1510", "datePublished": "2021-05-06T12:42:02.917449Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:19:11.003Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1509
Vulnerability from cvelistv5
Published
2021-05-06 12:41
Modified
2024-11-08 23:19
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge router |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:17:52.723369Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:19:20.241Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-06T12:41:58", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ], "source": { "advisory": "cisco-sa-sdwan-buffover-MWGucjtO", "defect": [ [ "CSCvt11545", "CSCvu28407", "CSCvu28442" ] ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-05-05T16:00:00", "ID": "CVE-2021-1509", "STATE": "PUBLIC", "TITLE": "Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN vEdge router", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20210505 Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" } ] }, "source": { "advisory": "cisco-sa-sdwan-buffover-MWGucjtO", "defect": [ [ "CSCvt11545", "CSCvu28407", "CSCvu28442" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1509", "datePublished": "2021-05-06T12:41:58.360018Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:19:20.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20655
Vulnerability from cvelistv5
Published
2024-11-15 15:56
Modified
2024-11-15 21:00
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco IOS XR Software |
Version: N/A |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xr_software", "vendor": "cisco", "versions": [ { "lessThan": "7.0.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.1.1", "status": "affected", "version": "7.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "virtual_topology_system", "vendor": "cisco", "versions": [ { "lessThan": "2.6.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "network_services_orchestrator", "vendor": "cisco", "versions": [ { "lessThan": "4.3.9.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.5.6", "status": "affected", "version": "4.4.0.0", "versionType": "custom" }, { "lessThan": "4.5.7", "status": "affected", "version": "4.5.0", "versionType": "custom" }, { "lessThan": "4.6.1.7", "status": "affected", "version": "4.6.0", "versionType": "custom" }, { "lessThan": "4.7.1", "status": "affected", "version": "4.7.0", "versionType": "custom" }, { "lessThan": "5.1.0.1", "status": "affected", "version": "5.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "enterprise_nfv_infrastructure_software", "vendor": "cisco", "versions": [ { "lessThan": "3.12.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "lessThan": "18.4.4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "19.2.1", "status": "affected", "version": "19.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xe_catalyst_sd-wan", "vendor": "cisco", "versions": [ { "lessThan": "16.10.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "16.12.1b", "status": "affected", "version": "16.12.0", "versionType": "custom" }, { "lessThan": "17.2.1r", "status": "affected", "version": "17.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sd-wan_vedge_router", "vendor": "cisco", "versions": [ { "lessThan": "18.4.4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "19.2.1", "status": "affected", "version": "19.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "carrier_packet_transport", "vendor": "cisco", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-20655", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T19:43:18.170598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:00:58.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XR Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Virtual Topology System (VTS)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Network Services Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Enterprise NFV Infrastructure Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco IOS XE Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Ultra Gateway Platform", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Carrier Packet Transport", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.5" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "9.2.2" }, { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.3.0" }, { "status": "affected", "version": "2.3.3" }, { "status": "affected", "version": "2.3.5" }, { "status": "affected", "version": "2.3.4" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.5" }, { "status": "affected", "version": "2.4.0" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "10.8.0" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "1.0.2" }, { "status": "affected", "version": "1.1.1" }, { "status": "affected", "version": "1.1.2" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "12.1.0" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.0" }, { "status": "affected", "version": "4.1.82" }, { "status": "affected", "version": "4.1.4" }, { "status": "affected", "version": "4.6.1" }, { "status": "affected", "version": "4.0.4" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "6.2.4" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "9.5.0" }, { "status": "affected", "version": "9.5.3" }, { "status": "affected", "version": "9.5.1" }, { "status": "affected", "version": "9.5.2" }, { "status": "affected", "version": "9.7.0" }, { "status": "affected", "version": "9.521" }, { "status": "affected", "version": "4.5.0" }, { "status": "affected", "version": "4.7.0" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:56:42.927Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cli-cmdinj-4MttWZPB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB" }, { "name": "cisco-sa-confdcli-cmdinj-wybQDSSh", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh" } ], "source": { "advisory": "cisco-sa-cli-cmdinj-4MttWZPB", "defects": [ "CSCvq22323", "CSCvq58164", "CSCvq58224", "CSCvq58168", "CSCvq58183", "CSCvq58226", "CSCvz49669", "CSCvq58204", "CSCvm76596" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20655", "datePublished": "2024-11-15T15:56:42.927Z", "dateReserved": "2021-11-02T13:28:29.037Z", "dateUpdated": "2024-11-15T21:00:58.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3385
Vulnerability from cvelistv5
Published
2020-07-16 17:22
Modified
2024-11-15 16:51
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Routers Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge router |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.394Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200715 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:27:12.953778Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:51:58.926Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted packets through an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-371", "description": "CWE-371", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T17:22:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200715 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV" } ], "source": { "advisory": "cisco-sa-vedgfpdos-PkqQrnwV", "defect": [ [ "CSCvs72674" ] ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-07-15T16:00:00", "ID": "CVE-2020-3385", "STATE": "PUBLIC", "TITLE": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN vEdge router", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted packets through an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.4", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-371" } ] } ] }, "references": { "reference_data": [ { "name": "20200715 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV" } ] }, "source": { "advisory": "cisco-sa-vedgfpdos-PkqQrnwV", "defect": [ [ "CSCvs72674" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3385", "datePublished": "2020-07-16T17:22:04.838274Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T16:51:58.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3369
Vulnerability from cvelistv5
Published
2020-07-16 17:21
Modified
2024-11-15 16:53
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Routers Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco SD-WAN vEdge router |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200715 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3369", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:21:00.555487Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:53:46.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper processing of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP packets through an affected device. A successful exploit could allow the attacker to make the device reboot continuously, causing a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-118", "description": "CWE-118", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T17:21:32", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200715 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f" } ], "source": { "advisory": "cisco-sa-fpdos-hORBfd9f", "defect": [ [ "CSCvs72669" ] ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-07-15T16:00:00", "ID": "CVE-2020-3369", "STATE": "PUBLIC", "TITLE": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco SD-WAN vEdge router", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper processing of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP packets through an affected device. A successful exploit could allow the attacker to make the device reboot continuously, causing a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-118" } ] } ] }, "references": { "reference_data": [ { "name": "20200715 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f" } ] }, "source": { "advisory": "cisco-sa-fpdos-hORBfd9f", "defect": [ [ "CSCvs72669" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3369", "datePublished": "2020-07-16T17:21:32.979530Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T16:53:46.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26071
Vulnerability from cvelistv5
Published
2024-11-18 16:05
Modified
2024-11-18 16:23
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Arbitrary File Creation Vulnerability
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2020-26071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T16:23:33.627962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:23:51.429Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vContainer", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "19.2.3" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Cloud", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "19.2.3" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "19.1.01" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "20.1.11" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco\u0026nbsp;SD-WAN Software could allow an authenticated, local attacker to create or overwrite arbitrary files on an affected device, which could result in a denial of service (DoS) condition.\r\nThe vulnerability is due to insufficient input validation for specific commands. An attacker could exploit this vulnerability by including crafted arguments to those specific commands. A successful exploit could allow the attacker to create or overwrite arbitrary files on the affected device, which could result in a DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:05:35.221Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vsoln-arbfile-gtsEYxns", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns" } ], "source": { "advisory": "cisco-sa-vsoln-arbfile-gtsEYxns", "defects": [ "CSCvv09807" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Arbitrary File Creation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26071", "datePublished": "2024-11-18T16:05:35.221Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2024-11-18T16:23:51.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }