QID 316968

Date Published: 2021-05-10

QID 316968: Cisco SD-WAN Software vDaemon Denial of Service Vulnerability(cisco-sa-sdwan-dos-Ckn5cVqW)

A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an
unauthenticated, remote attacker to cause a device to reload,
resulting in a denial of service (DoS) condition. Affected Products
Cisco products if they are running a vulnerable release of Cisco SD-WAN software:
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Cloud Routers
SD-WAN vEdge Routers
SD-WAN vManage Software
SD-WAN vSmart Controller Software
Cisco SD-WAN Software releases :
Prior to 20.3.1
From 20.4.0 Prior to 20.4.1
From 20.5.0 Prior to 20.5.1
Note: Support only for SD-WAN vManage and vedge-100-M.

QID detection logic:
The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command.

A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sdwan-dos-Ckn5cVqW for more information.

    CVEs related to QID 316968

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sdwan-dos-Ckn5cVqW URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW