Lucene search

K
ciscoCiscoCISCO-SA-AIRONET-MDNS-DOS-E6KWYUMX
HistoryMar 24, 2021 - 4:00 p.m.

Cisco Aironet Access Points FlexConnect Multicast DNS Denial of Service Vulnerability

2021-03-2416:00:00
tools.cisco.com
69

0.001 Low

EPSS

Percentile

24.6%

A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx”]

0.001 Low

EPSS

Percentile

24.6%

Related for CISCO-SA-AIRONET-MDNS-DOS-E6KWYUMX