ID

VAR-202103-1605


CVE

CVE-2021-1466


TITLE

Cisco Systems  Cisco Catalyst SD-WAN Manager  Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-021893

DESCRIPTION

A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager There is an input validation vulnerability in.Information is tampered with and service operation is interrupted (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-1466 // JVNDB: JVNDB-2021-021893

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.7

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.0.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.302

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.099

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.8

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.7

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.303

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.8

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.098

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.6.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.0.1a

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.10

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.2.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.097

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.0.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.3.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.2

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.3.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.1.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.9

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.1

Trust: 1.0

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.4

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.8

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.8

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.6.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.1.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.4

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.4.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.2.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.10

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.7

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.5

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.5

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.3

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.7

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.9

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.3.1

Trust: 0.8

sources: JVNDB: JVNDB-2021-021893 // NVD: CVE-2021-1466

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@cisco.com: CVE-2021-1466
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2021-1466
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1466
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202103-311
value: MEDIUM

Trust: 0.6

psirt@cisco.com: CVE-2021-1466
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 2.0

NVD: CVE-2021-1466
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-021893 // CNNVD: CNNVD-202103-311 // NVD: CVE-2021-1466 // NVD: CVE-2021-1466

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-021893 // NVD: CVE-2021-1466

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202103-311

PATCH

title:cisco-sa-sdwan-vdaemon-bo-RuzzEA2url:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2

Trust: 0.8

title:Cisco SD-WAN vManage Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143723

Trust: 0.6

sources: JVNDB: JVNDB-2021-021893 // CNNVD: CNNVD-202103-311

EXTERNAL IDS

db:NVDid:CVE-2021-1466

Trust: 3.2

db:JVNDBid:JVNDB-2021-021893

Trust: 0.8

db:AUSCERTid:ESB-2021.0776

Trust: 0.6

db:CNNVDid:CNNVD-202103-311

Trust: 0.6

sources: JVNDB: JVNDB-2021-021893 // CNNVD: CNNVD-202103-311 // NVD: CVE-2021-1466

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-vdaemon-bo-ruzzea2

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-1466

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-vdaemon-bo-ruzzea2

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0776

Trust: 0.6

sources: JVNDB: JVNDB-2021-021893 // CNNVD: CNNVD-202103-311 // NVD: CVE-2021-1466

SOURCES

db:JVNDBid:JVNDB-2021-021893
db:CNNVDid:CNNVD-202103-311
db:NVDid:CVE-2021-1466

LAST UPDATE DATE

2025-08-06T22:57:07.970000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-021893date:2025-08-05T05:17:00
db:CNNVDid:CNNVD-202103-311date:2021-03-05T00:00:00
db:NVDid:CVE-2021-1466date:2025-08-04T14:37:51.587

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-021893date:2025-08-05T00:00:00
db:CNNVDid:CNNVD-202103-311date:2021-03-03T00:00:00
db:NVDid:CVE-2021-1466date:2024-11-15T17:15:07.670