Description
A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make.
References (2)
Core 2
Core References
Vendor Advisory vendor-advisory
x_refsource_cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanbo-QKcABnS2
Exploit, Third Party Advisory x_refsource_misc
https://github.com/orangecertcc/security-research/security/advisories/GHSA-wwq2-pxrj-v62r
Scores
CVSS v3
7.1
EPSS
0.0014
EPSS Percentile
34.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-119
CWE-120
Status
published
Products (3)
cisco/sd-wan_firmware
20.1.0
cisco/sd-wan_firmware
20.3.0
cisco/sd-wan_firmware
< 18.4.5
Published
Mar 19, 2020
Tracked Since
Feb 18, 2026