Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-1431

A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 7.8
Products affected by CVE-2021-1431
  • Cisco » Ios Xe » Version: 16.11.1
    cpe:2.3:o:cisco:ios_xe:16.11.1
  • Cisco » Ios Xe » Version: 16.11.1a
    cpe:2.3:o:cisco:ios_xe:16.11.1a
  • Cisco » Ios Xe » Version: 16.11.1b
    cpe:2.3:o:cisco:ios_xe:16.11.1b
  • Cisco » Ios Xe » Version: 16.11.1c
    cpe:2.3:o:cisco:ios_xe:16.11.1c
  • Cisco » Ios Xe » Version: 16.11.1s
    cpe:2.3:o:cisco:ios_xe:16.11.1s
  • Cisco » Ios Xe » Version: 16.11.2
    cpe:2.3:o:cisco:ios_xe:16.11.2
  • Cisco » Ios Xe » Version: 16.12.1
    cpe:2.3:o:cisco:ios_xe:16.12.1
  • Cisco » Ios Xe » Version: 16.12.1a
    cpe:2.3:o:cisco:ios_xe:16.12.1a
  • Cisco » Ios Xe » Version: 16.12.1c
    cpe:2.3:o:cisco:ios_xe:16.12.1c
  • Cisco » Ios Xe » Version: 16.12.1s
    cpe:2.3:o:cisco:ios_xe:16.12.1s
  • Cisco » Ios Xe » Version: 16.12.1t
    cpe:2.3:o:cisco:ios_xe:16.12.1t
  • Cisco » Ios Xe » Version: 16.12.1w
    cpe:2.3:o:cisco:ios_xe:16.12.1w
  • Cisco » Ios Xe » Version: 16.12.1x
    cpe:2.3:o:cisco:ios_xe:16.12.1x
  • Cisco » Ios Xe » Version: 16.12.1y
    cpe:2.3:o:cisco:ios_xe:16.12.1y
  • Cisco » Ios Xe » Version: 16.12.1z
    cpe:2.3:o:cisco:ios_xe:16.12.1z
  • Cisco » Ios Xe » Version: 16.12.2
    cpe:2.3:o:cisco:ios_xe:16.12.2
  • Cisco » Ios Xe » Version: 16.12.2a
    cpe:2.3:o:cisco:ios_xe:16.12.2a
  • Cisco » Ios Xe » Version: 16.12.2s
    cpe:2.3:o:cisco:ios_xe:16.12.2s
  • Cisco » Ios Xe » Version: 16.12.2t
    cpe:2.3:o:cisco:ios_xe:16.12.2t
  • Cisco » Ios Xe » Version: 16.12.3
    cpe:2.3:o:cisco:ios_xe:16.12.3
  • Cisco » Ios Xe » Version: 16.12.3a
    cpe:2.3:o:cisco:ios_xe:16.12.3a
  • Cisco » Ios Xe » Version: 16.12.3s
    cpe:2.3:o:cisco:ios_xe:16.12.3s
  • Cisco » Ios Xe » Version: 16.12.4
    cpe:2.3:o:cisco:ios_xe:16.12.4
  • Cisco » Ios Xe » Version: 16.12.4a
    cpe:2.3:o:cisco:ios_xe:16.12.4a
  • Cisco » Ios Xe » Version: 17.2.1
    cpe:2.3:o:cisco:ios_xe:17.2.1
  • Cisco » Ios Xe » Version: 17.2.1a
    cpe:2.3:o:cisco:ios_xe:17.2.1a
  • Cisco » Ios Xe » Version: 17.2.1r
    cpe:2.3:o:cisco:ios_xe:17.2.1r
  • Cisco » Ios Xe » Version: 17.2.1v
    cpe:2.3:o:cisco:ios_xe:17.2.1v
  • Cisco » Ios Xe » Version: 17.2.2
    cpe:2.3:o:cisco:ios_xe:17.2.2
  • Cisco » Ios Xe » Version: 17.2.3
    cpe:2.3:o:cisco:ios_xe:17.2.3
  • Cisco » Ios Xe » Version: 3.15.1xbs
    cpe:2.3:o:cisco:ios_xe:3.15.1xbs
  • Cisco » Ios Xe » Version: 3.15.2xbs
    cpe:2.3:o:cisco:ios_xe:3.15.2xbs


Contact Us

Shodan ® - All rights reserved