{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:37:22.571","vulnerabilities":[{"cve":{"id":"CVE-2020-3351","sourceIdentifier":"psirt@cisco.com","published":"2020-07-16T18:15:17.907","lastModified":"2024-11-21T05:30:51.480","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of fields in Cisco SD-WAN peering messages that are encapsulated in UDP packets. An attacker could exploit this vulnerability by sending crafted UDP messages to the targeted system. A successful exploit could allow the attacker to cause services on the device to fail, resulting in a DoS condition that could impact the targeted device and other devices that depend on it."},{"lang":"es","value":"Una vulnerabilidad en Cisco SD-WAN Solution Software podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS). La vulnerabilidad es debido a una comprobación inapropiada de los campos en los mensajes de interconexión SD-WAN de Cisco que están encapsulados en paquetes UDP. Un atacante podría explotar esta vulnerabilidad mediante el envío de mensajes UDP diseñados hacia el sistema objetivo. Una explotación con éxito podría permitir a un atacante causar un fallo en los servicios del dispositivo, resultando en una condición DoS que podría afectar el dispositivo objetivo y otros dispositivos que dependen de él"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"17.2.7","matchCriteriaId":"63CA5CB9-FD3B-46F0-AA1E-4F538C043863"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"17.2.8","versionEndExcluding":"18.3.0","matchCriteriaId":"C47A3040-34A7-4D25-B733-22E90D516D3F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*","matchCriteriaId":"00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*","matchCriteriaId":"F019975D-3A45-4522-9CB9-F4258C371DF6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*","matchCriteriaId":"0811E0B5-889E-451E-B754-A8FEE32BDFA2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*","matchCriteriaId":"36973815-F46D-4ADA-B9DF-BCB70AC60BD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*","matchCriteriaId":"061A302C-8D35-4E80-93DA-916DA7E90C06"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"140AF13E-4463-478B-AA94-97406A80CB86"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*","matchCriteriaId":"1356861D-E6CA-4973-9597-629507E8C07E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*","matchCriteriaId":"3414A3DC-8CF2-41B5-BD73-127712934DE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"2F16884C-A2EE-4867-8806-6418E000078C"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-dos-KWOdyHnB","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-dos-KWOdyHnB","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}