Executive Summary
Summary | |
---|---|
Title | Cisco Aironet 1560, 2800, and 3800 Series Access Point Platforms Extensible Authentication Protocol Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20171101-aironet2 | First vendor Publication | 2017-11-01 |
Vendor | Cisco | Last vendor Modification | 2017-11-01 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.1 | Attack Range | Adjacent network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in Extensible Authentication Protocol (EAP) ingress frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of the EAP frame. An attacker could exploit this vulnerability by sending a malformed EAP frame to the targeted device. A successful exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. It may be necessary to manually power cycle the device in order for it to recover. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2"] BEGIN PGP SIGNATURE iQKBBAEBAgBrBQJZ+fHVZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHmc2xAAgcr1AJcd1vLpgSoc jhT3p2sv7PRQ1ue60Syjf7kuz5iKi2g6e3l7A53adIZAvEBypbDJx7v2gYkv8VwI HtdHZ6ffM6fCPyHI237GdeVCTK5Rk8lqKlEqdYv5L5icpPdQvB2yVZyc2GfjbZ4y t8QYBpkj2gEPWBhJM4eiieYpab9Z4MuBpm+m6FgLKAjYc7brezYzFX9Q5ZF3PRk6 XmR9jUAu07Rvk6t07+9jF/gglKuLRRkD8Rwc8g1NK6Vp/KvBpovm3M4s5Fh/y51w 5T+AFWQaMnjk8H/+E9TNEGlNQbm3jAC6pD+Jc6ZF61xZvzu1WUqDcLf53IrenKg3 pF73Mt032Tr6B4EmD7D/TbAWN/KQjGSWKSjiNuApEyfIQv92ZxjzaalOO88bwwV/ D4T9pg3H1tuqP2q8G7j8MrwkqSH4uzLdQJW6cAO2YMoBv1CrkwiHDOuMCI3khhX4 UhhrrVTGP2lr24cFzRlfY+Nf6ju8/KPXFe6o6nBoWbY/KvZO2Setw1vHYqct2qnE Xh3Q6b8LkeE137OINTPKW4Ax11PCtKQDqrljpLwnK9OlnTjgATdEgMxjGhzKkisS MUmHuSll7nuTSLHpj6e9Z1gS/KOtZnNmaDJMYRVY7Xv6WgBxJ1Y40CoUEuhHfdXU 5fjE69X5xeV13shjp0+ujum35bU= =/o2P END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 |
Alert History
Date | Informations |
---|---|
2017-11-22 00:22:50 |
|
2017-11-02 21:25:39 |
|
2017-11-01 21:22:44 |
|