SB2020110544 - Packet Filtering Bypass in Cisco SD-WAN Software



SB2020110544 - Packet Filtering Bypass in Cisco SD-WAN Software

Published: November 5, 2020

Security Bulletin ID SB2020110544
Severity
Medium
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2020-3444)

The vulnerability allows a remote attacker to bypass L3 and L4 traffic filters.

The vulnerability exists due to improper traffic filtering conditions on an affected device. A remote attacker can send a specially crafted TCP packet, bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network. 


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.