QID 316968
Date Published: 2021-05-10
QID 316968: Cisco SD-WAN Software vDaemon Denial of Service Vulnerability(cisco-sa-sdwan-dos-Ckn5cVqW)
A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an
unauthenticated, remote attacker to cause a device to reload,
resulting in a denial of service (DoS) condition.
Affected Products
Cisco products if they are running a vulnerable release of Cisco SD-WAN software:
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Cloud Routers
SD-WAN vEdge Routers
SD-WAN vManage Software
SD-WAN vSmart Controller Software
Cisco SD-WAN Software releases :
Prior to 20.3.1
From 20.4.0 Prior to 20.4.1
From 20.5.0 Prior to 20.5.1
Note: Support only for SD-WAN vManage and vedge-100-M.
QID detection logic:
The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command.
A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Customers are advised to refer to cisco-sa-sdwan-dos-Ckn5cVqW for more information.
- cisco-sa-sdwan-dos-Ckn5cVqW -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW
CVEs related to QID 316968
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-sdwan-dos-Ckn5cVqW |
|