HIGH · 8.6

CVE-2020-3351

A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of field...

Vulnerability Description

A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of fields in Cisco SD-WAN peering messages that are encapsulated in UDP packets. An attacker could exploit this vulnerability by sending crafted UDP messages to the targeted system. A successful exploit could allow the attacker to cause services on the device to fail, resulting in a DoS condition that could impact the targeted device and other devices that depend on it.

CVSS Score

8.6

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
CiscoSd-Wan Firmware< 17.2.7
CiscoVedge 100-
CiscoVedge 1000-
CiscoVedge 100B-
CiscoVedge 100M-
CiscoVedge 100Wm-
CiscoVedge 2000-
CiscoVedge 5000-
CiscoVedge Cloud Router-
CiscoVsmart Controller-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-3351?

CVE-2020-3351 is a vulnerability with a CVSS score of 8.6 (HIGH). A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of field...

How severe is CVE-2020-3351?

CVE-2020-3351 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-3351?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Sd-Wan Firmware, Cisco Vedge 100, Cisco Vedge 1000, Cisco Vedge 100B, Cisco Vedge 100M.