A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.

Project Subscriptions

Vendors Products
1100 Integrated Services Router Subscribe
1101 Integrated Services Router Subscribe
1109 Integrated Services Router Subscribe
1111x Integrated Services Router Subscribe
111x Integrated Services Router Subscribe
1120 Integrated Services Router Subscribe
1160 Integrated Services Router Subscribe
4221 Integrated Services Router Subscribe
4321 Integrated Services Router Subscribe
4331 Integrated Services Router Subscribe
4351 Integrated Services Router Subscribe
4431 Integrated Services Router Subscribe
4451-x Integrated Services Router Subscribe
4461 Integrated Services Router Subscribe
Asr 1001-hx Subscribe
Asr 1001-x Subscribe
Asr 1002-hx Subscribe
Asr 1002-x Subscribe
Asr 1004 Subscribe
Asr 1006 Subscribe
Asr 1006-x Subscribe
Asr 1009-x Subscribe
Asr 1013 Subscribe
Catalyst 9800-40 Subscribe
Catalyst 9800-80 Subscribe
Catalyst 9800-cl Subscribe
Catalyst 9800-l Subscribe
Catalyst 9800-l-c Subscribe
Catalyst 9800-l-f Subscribe
Catalyst C9200-24p Subscribe
Catalyst C9200-24t Subscribe
Catalyst C9200-48p Subscribe
Catalyst C9200-48t Subscribe
Catalyst C9200l-24p-4g Subscribe
Catalyst C9200l-24p-4x Subscribe
Catalyst C9200l-24pxg-2y Subscribe
Catalyst C9200l-24pxg-4x Subscribe
Catalyst C9200l-24t-4g Subscribe
Catalyst C9200l-24t-4x Subscribe
Catalyst C9200l-48p-4g Subscribe
Catalyst C9300-24p Subscribe
Catalyst C9300-24s Subscribe
Catalyst C9300-24t Subscribe
Catalyst C9300-24u Subscribe
Catalyst C9300-24ux Subscribe
Catalyst C9300-48p Subscribe
Catalyst C9300-48s Subscribe
Catalyst C9300-48t Subscribe
Catalyst C9300-48u Subscribe
Catalyst C9300-48un Subscribe
Catalyst C9300-48uxm Subscribe
Catalyst C9300l-24p-4g Subscribe
Catalyst C9300l-24p-4x Subscribe
Catalyst C9300l-24t-4g Subscribe
Catalyst C9300l-24t-4x Subscribe
Catalyst C9300l-48p-4g Subscribe
Catalyst C9300l-48p-4x Subscribe
Catalyst C9300l-48t-4g Subscribe
Catalyst C9300l-48t-4x Subscribe
Catalyst C9404r Subscribe
Catalyst C9407r Subscribe
Catalyst C9410r Subscribe
Catalyst C9500-12q Subscribe
Catalyst C9500-16x Subscribe
Catalyst C9500-24q Subscribe
Catalyst C9500-24y4c Subscribe
Catalyst C9500-32c Subscribe
Catalyst C9500-32qc Subscribe
Catalyst C9500-40x Subscribe
Catalyst C9500-48y4c Subscribe
Catalyst C9600 Switch Subscribe
Cloud Services Router 1000v Subscribe
Integrated Services Virtual Router Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24699 A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T17:57:01.984Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3428

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:19.387

Modified: 2024-11-21T05:31:03.023

Link: CVE-2020-3428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses