Lucene search

K
ciscoCiscoCISCO-SA-AP-ETHPORT-DOS-XTJTT8PY
HistorySep 24, 2020 - 4:00 p.m.

Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability

2020-09-2416:00:00
tools.cisco.com
19
cisco
aironet
access points
ethernet
dos
vulnerability

EPSS

0.001

Percentile

25.0%

A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the attacker to cause a NULL pointer access that results in a reload of the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY”]

Affected configurations

Vulners
Node
ciscoaironet_access_point_softwareMatchany
OR
ciscocisco_aironet_access_point_software_\(ios_xe_controller\)Matchany
OR
ciscoaironet_access_point_softwareMatchany
OR
ciscocisco_aironet_access_point_software_\(ios_xe_controller\)Matchany
VendorProductVersionCPE
ciscoaironet_access_point_softwareanycpe:2.3:a:cisco:aironet_access_point_software:any:*:*:*:*:*:*:*
ciscocisco_aironet_access_point_software_\(ios_xe_controller\)anycpe:2.3:a:cisco:cisco_aironet_access_point_software_\(ios_xe_controller\):any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

25.0%

Related for CISCO-SA-AP-ETHPORT-DOS-XTJTT8PY