A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote malicious user to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the malicious user to cause the device to reload, resulting in a DoS condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco sd-wan vbond orchestrator - |
||
cisco catalyst sd-wan manager |
||
cisco vsmart controller firmware - |
||
cisco vedge 100 firmware - |
||
cisco vedge 1000 firmware - |
||
cisco vedge 100b firmware - |
||
cisco vedge 100m firmware - |
||
cisco vedge 100wm firmware - |
||
cisco vedge 2000 firmware - |
||
cisco vedge 5000 firmware - |
||
cisco vedge-100b firmware - |
||
cisco vedge cloud firmware - |