Lucene search

K
ciscoCiscoCISCO-SA-CEDGE-FILT-BYPASS-Y6WZMQM4
HistoryNov 04, 2020 - 4:00 p.m.

Cisco SD-WAN Software Packet Filtering Bypass Vulnerability

2020-11-0416:00:00
tools.cisco.com
53
cisco
sd-wan
software
packet filtering
bypass
vulnerability
unauthenticated
attacker
traffic
filters
inject
malicious

EPSS

0.001

Percentile

49.9%

A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters.

The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious packet with specific characteristics and sending it to a targeted device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cedge-filt-bypass-Y6wZMqm4 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cedge-filt-bypass-Y6wZMqm4”]

Affected configurations

Vulners
Node
ciscosd-wan_solutionMatchany
OR
ciscosd-wan_solutionMatchany
VendorProductVersionCPE
ciscosd-wan_solutionanycpe:2.3:a:cisco:sd-wan_solution:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

49.9%

Related for CISCO-SA-CEDGE-FILT-BYPASS-Y6WZMQM4