ID

VAR-202101-1015


CVE

CVE-2021-1241


TITLE

plural  Cisco SD-WAN  Buffer error vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2021-002620

DESCRIPTION

Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. The VPN tunnel function of Cisco SD-WAN vEdge Router has a denial of service vulnerability. The vulnerability is caused by the program's failure to properly process malformed data packets. Remote attackers without authentication can send specially crafted data packets to the affected device. Exploit this vulnerability to cause the device to restart, resulting in a denial of service

Trust: 2.34

sources: NVD: CVE-2021-1241 // JVNDB: JVNDB-2021-002620 // CNVD: CNVD-2021-15778 // VULHUB: VHN-374295 // VULMON: CVE-2021-1241

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-15778

AFFECTED PRODUCTS

vendor:ciscomodel:ios xe sd-wanscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:20.1.0

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.99

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.4.1

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.4.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vsmart controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:sd-wan vbond orchestratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.1

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.4.5

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.3.5

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.3.8

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.2

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.0

Trust: 1.0

vendor:シスコシステムズmodel:cisco sd-wan vbond orchestratorscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco sd-wanscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco sd-wan vmanagescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco ios xe sd-wanscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco sd-wan vsmart controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:sd-wan vedge routersscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-15778 // JVNDB: JVNDB-2021-002620 // NVD: CVE-2021-1241

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1241
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1241
value: HIGH

Trust: 1.0

NVD: CVE-2021-1241
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-15778
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202101-1620
value: HIGH

Trust: 0.6

VULHUB: VHN-374295
value: HIGH

Trust: 0.1

VULMON: CVE-2021-1241
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1241
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-15778
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-374295
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1241
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1241
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-1241
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-15778 // VULHUB: VHN-374295 // VULMON: CVE-2021-1241 // JVNDB: JVNDB-2021-002620 // CNNVD: CNNVD-202101-1620 // NVD: CVE-2021-1241 // NVD: CVE-2021-1241

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

problemtype:Buffer error (CWE-119) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-374295 // JVNDB: JVNDB-2021-002620 // NVD: CVE-2021-1241

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-1620

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202101-1620

PATCH

title:cisco-sa-sdwan-dosmulti-48jJuEUPurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP

Trust: 0.8

title:Patch for Cisco SD-WAN vEdge Router VPN Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/251581

Trust: 0.6

title:Cisco SD-WAN products Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139962

Trust: 0.6

title:Cisco: Cisco SD-WAN Denial of Service Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sdwan-dosmulti-48jJuEUP

Trust: 0.1

sources: CNVD: CNVD-2021-15778 // VULMON: CVE-2021-1241 // JVNDB: JVNDB-2021-002620 // CNNVD: CNNVD-202101-1620

EXTERNAL IDS

db:NVDid:CVE-2021-1241

Trust: 3.2

db:JVNDBid:JVNDB-2021-002620

Trust: 0.8

db:CNNVDid:CNNVD-202101-1620

Trust: 0.7

db:CNVDid:CNVD-2021-15778

Trust: 0.6

db:AUSCERTid:ESB-2021.0241

Trust: 0.6

db:VULHUBid:VHN-374295

Trust: 0.1

db:VULMONid:CVE-2021-1241

Trust: 0.1

sources: CNVD: CNVD-2021-15778 // VULHUB: VHN-374295 // VULMON: CVE-2021-1241 // JVNDB: JVNDB-2021-002620 // CNNVD: CNNVD-202101-1620 // NVD: CVE-2021-1241

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-dosmulti-48jjueup

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1241

Trust: 2.0

url:https://www.auscert.org.au/bulletins/esb-2021.0241/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-sd-wan-vedge-five-vulnerabilities-34396

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/195308

Trust: 0.1

sources: CNVD: CNVD-2021-15778 // VULHUB: VHN-374295 // VULMON: CVE-2021-1241 // JVNDB: JVNDB-2021-002620 // CNNVD: CNNVD-202101-1620 // NVD: CVE-2021-1241

SOURCES

db:CNVDid:CNVD-2021-15778
db:VULHUBid:VHN-374295
db:VULMONid:CVE-2021-1241
db:JVNDBid:JVNDB-2021-002620
db:CNNVDid:CNNVD-202101-1620
db:NVDid:CVE-2021-1241

LAST UPDATE DATE

2024-08-14T13:23:53.979000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-15778date:2021-03-09T00:00:00
db:VULHUBid:VHN-374295date:2021-01-27T00:00:00
db:VULMONid:CVE-2021-1241date:2021-01-27T00:00:00
db:JVNDBid:JVNDB-2021-002620date:2021-09-27T09:06:00
db:CNNVDid:CNNVD-202101-1620date:2021-02-02T00:00:00
db:NVDid:CVE-2021-1241date:2023-11-07T03:27:46.127

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-15778date:2021-03-09T00:00:00
db:VULHUBid:VHN-374295date:2021-01-20T00:00:00
db:VULMONid:CVE-2021-1241date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2021-002620date:2021-09-27T00:00:00
db:CNNVDid:CNNVD-202101-1620date:2021-01-20T00:00:00
db:NVDid:CVE-2021-1241date:2021-01-20T21:15:12.100