Cisco IOS XE Software
At the time of publication, this vulnerability affected universal Cisco IOS XE Software releases 17.2.1r and later that were running in Controller mode. Cisco IOS XE Software releases earlier than Release 17.2.1r are not affected by this vulnerability because they do not include the SD-WAN feature.
At the time of publication, this vulnerability also affected the following standalone Cisco IOS XE SD-WAN Software releases:
- 16.9.1 through 16.9.4
- 16.10.1 through 16.10.5
- 16.11.1a
- 16.12.2r through 16.12.4
Note: The standalone Cisco IOS XE SD-WAN release images are separate from the universal Cisco IOS XE Software releases. The SD-WAN feature set was first integrated into the universal Cisco IOS XE Software releases starting with Cisco IOS XE Software Release 17.2.1r. For more information, see the Install and Upgrade Cisco IOS XE Catalyst SD-WAN Release 17.2.1r and Later chapter of the Cisco Catalyst SD-WAN Getting Started Guide.
Cisco IOS XE cEdge Routers
At the time of publication, this vulnerability affected Cisco SD-WAN cEdge Routers with Simple Network Management Protocol (SNMP) enabled on the tunnel 0 interface. If SNMP is not enabled, the device is not affected by this vulnerability.
For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory.
Determine the Device Configuration
To determine whether a device has SNMP version 1 (SNMPv1) or Community-based SNMP version 2 (SNMPv2c) enabled, use the show running-config | include snmp-server community CLI command. If there is output, SNMP is enabled, as shown in the following example:
Router# show running-config | include snmp-server community
snmp-server community public ro
To determine whether a device has SNMP version 3 (SNMPv3) enabled, use the show running-config | include snmp-server group and show snmp user CLI commands. If there is output from both commands, SNMPv3 is enabled, as shown in the following example:
Router# show running-config | include snmp-server group
snmp-server group v3group v3 noauth
Router# show snmp user
User name: remoteuser1
Engine ID: 800000090300EE01E71C178C
storage-type: nonvolatile active
Authentication Protocol: SHA
Privacy Protocol: None
Group-name: v3group