7.8
CVSSv2

CVE-2021-1513

Published: 06/05/2021 Updated: 21/03/2024
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote malicious user to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the malicious user to cause the device to reload, resulting in a DoS condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco sd-wan vbond orchestrator -

cisco catalyst sd-wan manager

cisco vsmart_controller_firmware -

cisco vedge_100_firmware -

cisco vedge_1000_firmware -

cisco vedge_100b_firmware -

cisco vedge_100m_firmware -

cisco vedge_100wm_firmware -

cisco vedge_2000_firmware -

cisco vedge_5000_firmware -

cisco vedge-100b_firmware -

cisco vedge_cloud_firmware -

Vendor Advisories

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition This vulnerability is due to insufficient handling of malformed packets An attacker could exploit this vulnerability by sending crafted traffic to an affected ...