CVE-2021-1513

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ciscoCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
ciscocatalyst_sd-wan_manager
𝑥
< 20.3.1
ciscocatalyst_sd-wan_manager
20.4 ≤
𝑥
< 20.4.1
ciscocatalyst_sd-wan_manager
20.5 ≤
𝑥
< 20.5.1
ciscosd-wan_vbond_orchestrator
-
ciscovsmart_controller_firmware
-
ciscovedge_100_firmware
-
ciscovedge_1000_firmware
-
ciscovedge_100b_firmware
-
ciscovedge_100m_firmware
-
ciscovedge_100wm_firmware
-
ciscovedge_2000_firmware
-
ciscovedge_5000_firmware
-
ciscovedge-100b_firmware
-
ciscovedge_cloud_firmware
-
𝑥
= Vulnerable software versions