| |
Podatność CVE-2020-3351
Publikacja: 2020-07-16
Opis: |
A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of fields in Cisco SD-WAN peering messages that are encapsulated in UDP packets. An attacker could exploit this vulnerability by sending crafted UDP messages to the targeted system. A successful exploit could allow the attacker to cause services on the device to fail, resulting in a DoS condition that could impact the targeted device and other devices that depend on it. |
Typ:
CWE-400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Ogólna skala CVSS |
Znaczenie |
Łatwość wykorzystania |
7.8/10 |
6.9/10 |
10/10 |
Wymagany dostęp |
Złożoność ataku |
Autoryzacja |
Zdalny |
Niska |
Nie wymagana |
Wpływ na poufność |
Wpływ na integralność |
Wpływ na dostępność |
Brak |
Brak |
Pełny |
Referencje: |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-dos-KWOdyHnB
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|