cisco sd-wan-firmware CVE-2019-1951 vulnerability in Cisco Products
Published on August 8, 2019

Cisco SD-WAN Solution Packet Filtering Bypass Vulnerability
A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network.

Vendor Advisory NVD

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2019-1951

stack.watch emails you whenever new vulnerabilities are published in Cisco Sd Wan Firmware or Cisco Sd Wan. Just hit a watch button to start following.

 
 

Affected Versions

Cisco SD-WAN Solution:

Exploit Probability

EPSS
0.28%
Percentile
51.03%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.