A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.
This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system. | |
Title | Cisco SD-WAN vEdge Routers Denial of Service Vulnerability | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-09-25T16:20:12.079Z
Updated: 2024-09-25T18:36:07.489Z
Reserved: 2023-11-08T15:08:07.686Z
Link: CVE-2024-20496
Vulnrichment
Updated: 2024-09-25T18:36:03.946Z
NVD
Status : Awaiting Analysis
Published: 2024-09-25T17:15:18.020
Modified: 2024-09-26T13:32:02.803
Link: CVE-2024-20496
Redhat
No data.