A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote malicious user to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the malicious user to cause the device to reload, resulting in a DoS condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco sd-wan vbond orchestrator - |
||
cisco catalyst sd-wan manager |
||
cisco vsmart_controller_firmware - |
||
cisco vedge_100_firmware - |
||
cisco vedge_1000_firmware - |
||
cisco vedge_100b_firmware - |
||
cisco vedge_100m_firmware - |
||
cisco vedge_100wm_firmware - |
||
cisco vedge_2000_firmware - |
||
cisco vedge_5000_firmware - |
||
cisco vedge-100b_firmware - |
||
cisco vedge_cloud_firmware - |