Lucene search

K
nvd[email protected]NVD:CVE-2021-1433
HistoryMar 24, 2021 - 8:15 p.m.

CVE-2021-1433

2021-03-2420:15:14
CWE-119
web.nvd.nist.gov
5
vdaemon process
cisco ios xe sd-wan software
unauthenticated
remote attacker
buffer overflow
crafted traffic
man-in-the-middle
cisco vmanage
denial of service (dos)

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.9%

A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition.

Affected configurations

Nvd
Node
ciscoios_xeMatch3.15.1xbs
OR
ciscoios_xeMatch3.15.2xbs
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1a
OR
ciscoios_xeMatch16.12.1c
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.1t
OR
ciscoios_xeMatch16.12.1w
OR
ciscoios_xeMatch16.12.1x
OR
ciscoios_xeMatch16.12.1y
OR
ciscoios_xeMatch16.12.1z
OR
ciscoios_xeMatch16.12.1za
OR
ciscoios_xeMatch16.12.2
OR
ciscoios_xeMatch16.12.2a
OR
ciscoios_xeMatch16.12.2s
OR
ciscoios_xeMatch16.12.2t
OR
ciscoios_xeMatch16.12.3
OR
ciscoios_xeMatch16.12.3a
OR
ciscoios_xeMatch16.12.3s
OR
ciscoios_xeMatch17.2.1
OR
ciscoios_xeMatch17.2.1a
OR
ciscoios_xeMatch17.2.1r
OR
ciscoios_xeMatch17.2.1v
VendorProductVersionCPE
ciscoios_xe3.15.1xbscpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*
ciscoios_xe3.15.2xbscpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*
ciscoios_xe16.12.1cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
ciscoios_xe16.12.1acpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*
ciscoios_xe16.12.1ccpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*
ciscoios_xe16.12.1scpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*
ciscoios_xe16.12.1tcpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*
ciscoios_xe16.12.1wcpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*
ciscoios_xe16.12.1xcpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*
ciscoios_xe16.12.1ycpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*
Rows per page:
1-10 of 231

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.9%

Related for NVD:CVE-2021-1433