{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T06:30:51.967","vulnerabilities":[{"cve":{"id":"CVE-2022-20717","sourceIdentifier":"psirt@cisco.com","published":"2022-04-15T15:15:13.113","lastModified":"2024-11-21T06:43:24.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el proceso NETCONF de los routers Cisco SD-WAN vEdge podría permitir a un atacante local autenticado causar a un dispositivo afectado quedarse sin memoria, resultando en una condición de denegación de servicio (DoS). Esta vulnerabilidad es debido a una administración insuficiente de la memoria cuando un dispositivo afectado recibe grandes cantidades de tráfico. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico malicioso a un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar un bloqueo del dispositivo, resultando en una condición de DoS"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:C","baseScore":4.9,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-789"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*","versionEndIncluding":"20.6","matchCriteriaId":"8B7EA8D9-812D-4D62-A5A7-8994BDB0C8E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:sd-wan_vedge_router:20.7:*:*:*:*:*:*:*","matchCriteriaId":"26FADAB8-5A72-4B9D-9E9C-91A69F53B441"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:*:*:*:*","matchCriteriaId":"99FC163D-E468-4D98-AE56-D4D29F5C05D7"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_110:-:*:*:*:*:*:*:*","matchCriteriaId":"6062DBFF-04E4-48D9-A2A0-42BECE9E0EA2"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:*:*:*:*","matchCriteriaId":"3426DD26-48A7-408A-82B4-99CAA82804AF"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"E387174A-1A9C-4A16-9F66-8158F06C89C5"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_210:-:*:*:*:*:*:*:*","matchCriteriaId":"42DBB6B2-E526-4C12-AED8-245D4E21A011"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:*:*:*:*","matchCriteriaId":"2524E92A-D661-4F31-9026-2F182B68CDC0"},{"vulnerable":false,"criteria":"cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:*:*:*:*","matchCriteriaId":"C022A51A-6D37-4AA9-82B5-19F17EA581CC"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}