Vulnslist

find the latest Cisco vulnerabilities

Cisco SD-WAN Software Packet Filtering Bypass Vulnerability

cisco-sa-cedge-filt-bypass-Y6wZMqm4 · Medium · Published · Updated

A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters.  The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious packet with specific characteristics and sending it to a targeted device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cedge-filt-bypass-Y6wZMqm4

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2020-3444
Cisco Bug IDsCSCvw12895
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco SD-WAN Solution, Cisco Catalyst SD-WAN

Related Products

Product CVE Evidence
Cisco SD-WAN Solution CVE-2020-3444 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2020-3444 Cisco OpenVuln