![]() This advisory is available at the following link: There are no workarounds that address this vulnerability. A successful exploit could allow the attacker to cause a buffer overflow and possibly execute arbitrary commands with root-level privileges, or cause the device to reload, which could result in a denial of service condition.Ĭisco has released software updates that address this vulnerability. ![]() ![]() An attacker could exploit this vulnerability by sending crafted traffic to the device. This vulnerability is due to insufficient bounds checking when an affected device processes traffic. A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |