A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Metrics
Affected Vendors & Products
References
History
Sat, 09 Nov 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-08T23:17:08.141Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1513

Updated: 2024-08-03T16:11:17.692Z

Status : Modified
Published: 2021-05-06T13:15:10.850
Modified: 2024-11-21T05:44:31.207
Link: CVE-2021-1513

No data.