Description
A vulnerability in the access control list (ACL) processing of IPv4 packets of Cisco SD-WAN vEdge Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the improper enforcement of the implicit deny all at the end of a configured ACL. An attacker could exploit this vulnerability by attempting to send unauthorized traffic to an interface on an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
Problem types
Product status
20.9.1
20.9.1.1
20.9.2
20.9.3
20.9.3.1
20.9.2.2
20.9.2.3
20.9.4
20.9.5
20.9.5.1
20.9.6
20.9.5.3
20.3.1
20.3.2
20.4.1
20.4.1.1
20.3.3
20.4.1.2
20.4.2
20.3.4
20.3.5
20.9.1
20.3.6
20.9.2
20.3.7
20.9.3
20.3.3.2
20.3.4.3
20.9.3.1
20.3.7.1
20.3.5.1
20.4.2.3
20.9.2.2
20.3.7.2
20.9.2.3
20.9.4
20.12.1
20.3.8
20.9.4.1777
20.9.5
20.9.5.1
20.12.3.1
20.9.6
20.9.5.3
References
sec.cloudapps.cisco.com/...sory/cisco-sa-defaultacl-pSJk9nVF (cisco-sa-defaultacl-pSJk9nVF)