A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-05-05T00:00:00
Updated: 2021-05-06T12:50:54
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1513
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-06T13:15:10.850
Modified: 2024-03-21T20:02:24.913
Link: CVE-2021-1513
JSON object: View
Redhat Information
No data.
CWE