Executive Summary

Summary
Title Cisco Aironet 1560, 2800, and 3800 Series Access Point Platforms Extensible Authentication Protocol Denial of Service Vulnerability
Informations
Name cisco-sa-20171101-aironet2 First vendor Publication 2017-11-01
Vendor Cisco Last vendor Modification 2017-11-01
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 6.1 Attack Range Adjacent network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in Extensible Authentication Protocol (EAP) ingress frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to insufficient validation of the EAP frame. An attacker could exploit this vulnerability by sending a malformed EAP frame to the targeted device. A successful exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. It may be necessary to manually power cycle the device in order for it to recover.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2"]

BEGIN PGP SIGNATURE

iQKBBAEBAgBrBQJZ+fHVZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHmc2xAAgcr1AJcd1vLpgSoc jhT3p2sv7PRQ1ue60Syjf7kuz5iKi2g6e3l7A53adIZAvEBypbDJx7v2gYkv8VwI HtdHZ6ffM6fCPyHI237GdeVCTK5Rk8lqKlEqdYv5L5icpPdQvB2yVZyc2GfjbZ4y t8QYBpkj2gEPWBhJM4eiieYpab9Z4MuBpm+m6FgLKAjYc7brezYzFX9Q5ZF3PRk6 XmR9jUAu07Rvk6t07+9jF/gglKuLRRkD8Rwc8g1NK6Vp/KvBpovm3M4s5Fh/y51w 5T+AFWQaMnjk8H/+E9TNEGlNQbm3jAC6pD+Jc6ZF61xZvzu1WUqDcLf53IrenKg3 pF73Mt032Tr6B4EmD7D/TbAWN/KQjGSWKSjiNuApEyfIQv92ZxjzaalOO88bwwV/ D4T9pg3H1tuqP2q8G7j8MrwkqSH4uzLdQJW6cAO2YMoBv1CrkwiHDOuMCI3khhX4 UhhrrVTGP2lr24cFzRlfY+Nf6ju8/KPXFe6o6nBoWbY/KvZO2Setw1vHYqct2qnE Xh3Q6b8LkeE137OINTPKW4Ax11PCtKQDqrljpLwnK9OlnTjgATdEgMxjGhzKkisS MUmHuSll7nuTSLHpj6e9Z1gS/KOtZnNmaDJMYRVY7Xv6WgBxJ1Y40CoUEuhHfdXU 5fjE69X5xeV13shjp0+ujum35bU= =/o2P END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 1

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2017-11-22 00:22:50
  • Multiple Updates
2017-11-02 21:25:39
  • Multiple Updates
2017-11-01 21:22:44
  • First insertion