CVE-2021-1513

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:vsmart_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vsmart_controller:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:vedge_100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:vedge_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:vedge_100b_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:vedge_100m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:vedge_100wm_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:cisco:vedge_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:cisco:vedge_5000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:cisco:vedge-100b_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:cisco:vedge_cloud_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*

History

21 Mar 2024, 20:02

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*

16 Oct 2023, 16:35

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
First Time Cisco catalyst Sd-wan Manager

Information

Published : 2021-05-06 13:15

Updated : 2024-03-21 20:02


NVD link : CVE-2021-1513

Mitre link : CVE-2021-1513

CVE.ORG link : CVE-2021-1513


JSON object : View

Products Affected

cisco

  • vedge_1000_firmware
  • vedge_100m_firmware
  • vedge_100b_firmware
  • vedge_cloud_firmware
  • vedge_100
  • vedge_5000_firmware
  • vedge-100b_firmware
  • vedge_cloud
  • vedge_1000
  • vedge_100wm_firmware
  • sd-wan_vbond_orchestrator
  • vedge_5000
  • vedge_100wm
  • vedge_2000
  • vedge_2000_firmware
  • vsmart_controller_firmware
  • vedge_100b
  • catalyst_sd-wan_manager
  • vedge-100b
  • vedge_100m
  • vsmart_controller
  • vedge_100_firmware
CWE
CWE-20

Improper Input Validation