{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T13:28:02.593","vulnerabilities":[{"cve":{"id":"CVE-2021-1431","sourceIdentifier":"psirt@cisco.com","published":"2021-03-24T20:15:14.430","lastModified":"2024-11-21T05:44:20.893","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the vDaemon process of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a device to reload, resulting a denial of service (DoS) condition. This vulnerability is due to insufficient handling of malformed packets. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el proceso vDaemon del Software Cisco IOS XE SD-WAN, podría permitir a un atacante remoto no autenticado causar la recarga de un dispositivo, lo que resultará en una condición de denegación de servicio (DoS).&#xa0;Esta vulnerabilidad es debido al manejo insuficiente de paquetes malformados.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico diseñado hacia un dispositivo afectado.&#xa0;Una explotación con éxito podría permitir al atacante causar que el dispositivo se recargue, lo que resultaría en una condición de DoS"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*","matchCriteriaId":"4BF22C29-84DF-44CA-B574-FE04AB39E344"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*","matchCriteriaId":"C2C7C0BA-D618-4B65-B42C-43393167EEE0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*","matchCriteriaId":"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*","matchCriteriaId":"314C7763-A64D-4023-9F3F-9A821AE4151F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*","matchCriteriaId":"5820D71D-FC93-45AA-BC58-A26A1A39C936"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*","matchCriteriaId":"FC1C85DD-69CC-4AA8-B219-651D57FC3506"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*","matchCriteriaId":"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*","matchCriteriaId":"B53E377A-0296-4D7A-B97C-576B0026543D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*","matchCriteriaId":"C98DED36-D4B5-48D6-964E-EEEE97936700"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*","matchCriteriaId":"CD98C9E8-3EA6-4160-970D-37C389576516"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*","matchCriteriaId":"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*","matchCriteriaId":"9027A528-2588-4C06-810B-5BB313FE4323"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*","matchCriteriaId":"7745ED34-D59D-49CC-B174-96BCA03B3374"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*","matchCriteriaId":"19AF4CF3-6E79-4EA3-974D-CD451A192BA9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*","matchCriteriaId":"313BD54C-073C-4F27-82D5-C99EFC3A20F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*","matchCriteriaId":"93B96E01-3777-4C33-9225-577B469A6CE5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*","matchCriteriaId":"65FC3CC1-CF4F-4A2D-A500-04395AFE8B47"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*","matchCriteriaId":"E5019B59-508E-40B0-9C92-2C26F58E2FBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*","matchCriteriaId":"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*","matchCriteriaId":"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*","matchCriteriaId":"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*","matchCriteriaId":"D5750264-2990-4942-85F4-DB9746C5CA2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*","matchCriteriaId":"02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*","matchCriteriaId":"B9173AD6-6658-4267-AAA7-D50D0B657528"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*","matchCriteriaId":"7F02EE9D-45B1-43D6-B05D-6FF19472216B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*","matchCriteriaId":"1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*","matchCriteriaId":"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*","matchCriteriaId":"B51FA707-8DB1-4596-9122-D4BFEF17F400"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*","matchCriteriaId":"C04DF35A-1B6F-420A-8D84-74EB41BF3700"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*","matchCriteriaId":"211CC9B2-6108-4C50-AB31-DC527C43053E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*","matchCriteriaId":"75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*","matchCriteriaId":"08DCCBA3-82D2-4444-B5D3-E5FC58D024F9"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwdos-4zeEeC9w","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwdos-4zeEeC9w","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}