Unknown
CVE-2021-1433
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-1433
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when the device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. The attacker must have a man-in-the-middle position between Cisco vManage and an associated device that is running an affected version of Cisco IOS XE SD-WAN Software. An exploit could allow the attacker to conduct a controllable buffer overflow attack (and possibly execute arbitrary commands as the root user) or cause a device reload, resulting in a denial of service (DoS) condition.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- cisco
Products
- ios xe 16.12.1,
- ios xe 16.12.1a,
- ios xe 16.12.1c,
- ios xe 16.12.1s,
- ios xe 16.12.1t,
- ios xe 16.12.1w,
- ios xe 16.12.1x,
- ios xe 16.12.1y,
- ios xe 16.12.1z,
- ios xe 16.12.1za,
- ios xe 16.12.2,
- ios xe 16.12.2a,
- ios xe 16.12.2s,
- ios xe 16.12.2t,
- ios xe 16.12.3,
- ios xe 16.12.3a,
- ios xe 16.12.3s,
- ios xe 17.2.1,
- ios xe 17.2.1a,
- ios xe 17.2.1r,
- ios xe 17.2.1v,
- ios xe 3.15.1xbs,
- ios xe 3.15.2xbs
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: