Логотип exploitDog
bind:CVE-2019-1951
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1951

Количество 3

Количество 3

nvd логотип

CVE-2019-1951

больше 6 лет назад

A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-xpmg-vx7g-292w

больше 3 лет назад

A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

EPSS: Низкий
fstec логотип

BDU:2019-03160

больше 6 лет назад

Уязвимость компонента фильтрации трафика программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю обойти фильтры уровня L2 и L4

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1951

A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

CVSS3: 5.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-xpmg-vx7g-292w

A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03160

Уязвимость компонента фильтрации трафика программно-определяемой сети Cisco SD-WAN, позволяющая нарушителю обойти фильтры уровня L2 и L4

CVSS3: 5.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу