Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2012-08-06 |
Product | Aironet 3600 | Last view | 2013-07-23 |
Version | Type | Hardware | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:* | 2 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.4 | 2013-07-23 | CVE-2013-3441 | Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210. |
7.8 | 2012-08-06 | CVE-2012-1350 | Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-08-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco_ios_CSCtc12426.nasl - Type: ACT_GATHER_INFO |