// For flags

CVE-2019-1951

Cisco SD-WAN Solution Packet Filtering Bypass Vulnerability

Severity Score

5.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

Una vulnerabilidad en las funcionalidades de filtrado de paquete de SD-WAN Solution de Cisco, podría permitir a un atacante remoto no autenticado omitir los filtros de tráfico L3 y L4. La vulnerabilidad es debido a condiciones de filtrado de tráfico inapropiadas en un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad diseñando un paquete TCP malicioso con características específicas y enviándolo a un dispositivo de destino. Una explotación con éxito podría permitir al atacante omitir los filtros de tráfico L3 y L4 e inyectar un paquete arbitrario en la red.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-08-08 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Sd-wan Firmware
Search vendor "Cisco" for product "Sd-wan Firmware"
<= 19.1.0
Search vendor "Cisco" for product "Sd-wan Firmware" and version " <= 19.1.0"
-
Affected