Vulnslist

find the latest Cisco vulnerabilities

Cisco SD-WAN vEdge Software UDP Packet Validation Denial of Service Vulnerability

cisco-sa-sdw-vedos-KqFfhps3 · Medium · Published · Updated

A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2024-20496
Cisco Bug IDsCSCwd85135, CSCwc99618
CVSS ScoreBase 6.1
Base 6.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco SD-WAN vEdge Router, Cisco SD-WAN vEdge Cloud

CSAF Product Statuses

Product Status Source CVE Rows
Cisco SD-WAN vEdge Cloud known_affected cisco_csaf CVE-2024-20496 1
Cisco SD-WAN vEdge Router known_affected cisco_csaf CVE-2024-20496 1

Related Products

Product CVE Evidence
Cisco SD-WAN vEdge Cloud CVE-2024-20496 Cisco OpenVuln
Cisco SD-WAN vEdge Router CVE-2024-20496 Cisco OpenVuln
Cisco SD-WAN CVE-2024-20496 Cisco OpenVuln
Cisco vEdge Routers CVE-2024-20496 Cisco OpenVuln
Cisco Catalyst SD-WAN Software CVE-2024-20496 Cisco OpenVuln