Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability

cisco-sa-sdwan-utd-dos-hDATqxs · High · Published · Updated

A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs This advisory is part of the September 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability. However, in environments where the UTD feature is not needed, customers can remove or disable the UTD feature to close the attack vector. For more information, see the Install and Uninstall UTD Engine in SD-WAN with CLI ["https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/218339-install-and-uninstall-utd-engine-in-sd-w.html"] guide.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2024-20455
Cisco Bug IDsCSCwi07137
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 17.1.1, Cisco IOS XE Software 17.1.1a, Cisco IOS XE Software 17.1.1s, Cisco IOS XE Software 17.1.2, Cisco IOS XE Software 17.1.1t, Cisco IOS XE Software 17.1.3, Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1r, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.2.1v, Cisco IOS XE Software 17.2.2, Cisco IOS XE Software 17.2.3, Cisco IOS XE Software 17.3.1, Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.1a, Cisco IOS XE Software 17.3.1w, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.1x, Cisco IOS XE Software 17.3.1z, Cisco IOS XE Software 17.3.3a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.4a, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4b, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.3.8a, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.4.2, Cisco IOS XE Software 17.4.1a, Cisco IOS XE Software 17.4.1b, Cisco IOS XE Software 17.4.1c, Cisco IOS XE Software 17.4.2a, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1a, Cisco IOS XE Software 17.5.1b, Cisco IOS XE Software 17.5.1c, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.1w, Cisco IOS XE Software 17.6.1a, Cisco IOS XE Software 17.6.1x, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.1z, Cisco IOS XE Software 17.6.3a, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.1z1, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.6.6a, Cisco IOS XE Software 17.6.5a, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.7.1a, Cisco IOS XE Software 17.7.1b, Cisco IOS XE Software 17.7.2, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.10.1a, Cisco IOS XE Software 17.10.1b, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.8.1a, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.1w, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.1a, Cisco IOS XE Software 17.9.1x, Cisco IOS XE Software 17.9.1y, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.2a, Cisco IOS XE Software 17.9.1x1, Cisco IOS XE Software 17.9.3a, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.1y1, Cisco IOS XE Software 17.9.5, Cisco IOS XE Software 17.9.4a, Cisco IOS XE Software 17.9.5a, Cisco IOS XE Software 17.9.5b, Cisco IOS XE Software 17.9.5c, Cisco IOS XE Software 17.9.5d, Cisco IOS XE Software 17.9.5e, Cisco IOS XE Software 17.9.5f, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.11.1a, Cisco IOS XE Software 17.12.1, Cisco IOS XE Software 17.12.1w, Cisco IOS XE Software 17.12.1a, Cisco IOS XE Software 17.12.2, Cisco IOS XE Software 17.12.2a, Cisco IOS XE Software 17.13.1, Cisco IOS XE Software 17.13.1a, Cisco IOS XE Software 17.11.99SW, Cisco IOS XE Catalyst SD-WAN 17.6.4, Cisco IOS, Cisco IOS XE Catalyst SD-WAN, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco Catalyst 8300 Edge Platform CVE-2024-20455 Cisco OpenVuln
Cisco IOS CVE-2024-20455 Cisco OpenVuln
Cisco IOS XE Software CVE-2024-20455 Cisco OpenVuln
Cisco IOS XE Catalyst SD-WAN CVE-2024-20455 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2024-20455 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2024-20455 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2024-20455 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2024-20455 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2024-20455 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2024-20455 Cisco OpenVuln · software-dependent