CVE-2021-1431
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
24/03/2021
Last modified:
07/11/2023
Description
A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



