CVE-2024-20496
Vulnerability from cvelistv5
Published
2024-09-25 16:20
Modified
2024-09-25 18:36
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Routers Denial of Service Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco SD-WAN vEdge Cloud | |
Cisco | Cisco SD-WAN vEdge router |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20496", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T18:35:59.706749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T18:36:07.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Cloud", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "20.5.1" }, { "status": "affected", "version": "20.1.3" }, { "status": "affected", "version": "20.4.1.2" }, { "status": "affected", "version": "20.4.2" }, { "status": "affected", "version": "20.3.4" }, { "status": "affected", "version": "20.6.1" }, { "status": "affected", "version": "20.6.2" }, { "status": "affected", "version": "20.7.1" }, { "status": "affected", "version": "20.3.5" }, { "status": "affected", "version": "20.6.3" }, { "status": "affected", "version": "20.8.1" }, { "status": "affected", "version": "20.7.2" }, { "status": "affected", "version": "20.6.4" }, { "status": "affected", "version": "20.9.1" }, { "status": "affected", "version": "20.3.6" }, { "status": "affected", "version": "20.9.1.1" }, { "status": "affected", "version": "20.9.2" }, { "status": "affected", "version": "20.6.5" }, { "status": "affected", "version": "20.3.7" }, { "status": "affected", "version": "20.9.3" }, { "status": "affected", "version": "20.4.2.3" }, { "status": "affected", "version": "20.3.4.3" }, { "status": "affected", "version": "20.6.4.1" }, { "status": "affected", "version": "20.6.3.2" }, { "status": "affected", "version": "20.3.5.1" }, { "status": "affected", "version": "20.9.3.1" }, { "status": "affected", "version": "20.6.5.2" }, { "status": "affected", "version": "20.3.7.1" }, { "status": "affected", "version": "20.3.3.2" }, { "status": "affected", "version": "20.6.1.2" }, { "status": "affected", "version": "20.1.3.1" }, { "status": "affected", "version": "20.9.2.2" }, { "status": "affected", "version": "20.6.5.3" }, { "status": "affected", "version": "20.6.3.3" }, { "status": "affected", "version": "20.3.7.2" }, { "status": "affected", "version": "20.6.5.4" }, { "status": "affected", "version": "20.9.2.3" }, { "status": "affected", "version": "20.3.8" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "19.1.01" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "20.1.11" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "20.5.1" }, { "status": "affected", "version": "20.1.3" }, { "status": "affected", "version": "20.4.1.2" }, { "status": "affected", "version": "20.4.2" }, { "status": "affected", "version": "20.3.4" }, { "status": "affected", "version": "20.6.1" }, { "status": "affected", "version": "20.6.2" }, { "status": "affected", "version": "20.7.1" }, { "status": "affected", "version": "20.7.1.2" }, { "status": "affected", "version": "20.3.5" }, { "status": "affected", "version": "20.9.1" }, { "status": "affected", "version": "20.6.3" }, { "status": "affected", "version": "20.8.1" }, { "status": "affected", "version": "20.7.2" }, { "status": "affected", "version": "20.6.4" }, { "status": "affected", "version": "20.3.6" }, { "status": "affected", "version": "20.9.2" }, { "status": "affected", "version": "20.6.5" }, { "status": "affected", "version": "20.3.7" }, { "status": "affected", "version": "20.9.3" }, { "status": "affected", "version": "20.6.5.1" }, { "status": "affected", "version": "20.3.3.2" }, { "status": "affected", "version": "20.6.4.1" }, { "status": "affected", "version": "20.6.3.2" }, { "status": "affected", "version": "20.3.4.3" }, { "status": "affected", "version": "20.6.5.2" }, { "status": "affected", "version": "20.9.3.1" }, { "status": "affected", "version": "20.3.7.1" }, { "status": "affected", "version": "20.3.5.1" }, { "status": "affected", "version": "20.4.2.3" }, { "status": "affected", "version": "20.6.1.2" }, { "status": "affected", "version": "20.9.2.2" }, { "status": "affected", "version": "20.1.3.1" }, { "status": "affected", "version": "20.6.5.3" }, { "status": "affected", "version": "20.6.3.3" }, { "status": "affected", "version": "20.3.7.2" }, { "status": "affected", "version": "20.6.5.4" }, { "status": "affected", "version": "20.9.2.3" }, { "status": "affected", "version": "20.3.8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\r\n\r\nThis vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:20:12.079Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdw-vedos-KqFfhps3", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3" } ], "source": { "advisory": "cisco-sa-sdw-vedos-KqFfhps3", "defects": [ "CSCwd85135" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20496", "datePublished": "2024-09-25T16:20:12.079Z", "dateReserved": "2023-11-08T15:08:07.686Z", "dateUpdated": "2024-09-25T18:36:07.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-20496\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-09-25T17:15:18.020\",\"lastModified\":\"2024-09-26T13:32:02.803\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\\r\\n\\r\\nThis vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de validaci\u00f3n de paquetes UDP del software Cisco SD-WAN vEdge podr\u00eda permitir que un atacante adyacente no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un sistema afectado. Esta vulnerabilidad se debe al manejo incorrecto de un tipo espec\u00edfico de paquete UDP malformado. Un atacante en una posici\u00f3n de m\u00e1quina intermedia podr\u00eda aprovechar esta vulnerabilidad enviando paquetes UDP manipulados a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante haga que el dispositivo se reinicie, lo que provocar\u00eda una condici\u00f3n de DoS en el sistema afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.6,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3\",\"source\":\"ykramarz@cisco.com\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.