Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9pw7-f4hr-c838

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

EPSS

Процентиль: 59%
0.00384
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.5
nvd
почти 5 лет назад

A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

CVSS3: 7.5
fstec
почти 5 лет назад

Уязвимость процесса vDaemon микропрограммного обеспечения маршрутизаторов Cisco IOS XE SD-WAN, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 59%
0.00384
Низкий

Дефекты

CWE-20