Description
A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
Published: 2020-09-24
Score: 8.6 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24831 A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco 1111-4pwe 1111-8plteeawb 1111-8pwb 1113-8plteeawe 1113-8pmwe 1113-8pwe 1116-4plteeawe 1116-4pwe 1117-4plteeawe 1117-4pmlteeawe 1117-4pmwe 1117-4pwe Access Points Aironet 1542d Aironet 1542i Aironet 1562d Aironet 1562e Aironet 1562i Aironet 1815 Aironet 1830e Aironet 1830i Aironet 1850e Aironet 1850i Aironet 2800e Aironet 2800i Aironet 3800e Aironet 3800i Aironet 3800p Aironet 4800 Aironet Access Point Software Business 140ac Business 145ac Business 240ac Business Access Points Catalyst 9105 Catalyst 9115 Catalyst 9117 Catalyst 9120 Catalyst 9130 Catalyst 9800-40 Catalyst 9800-80 Catalyst 9800-cl Catalyst 9800-l Catalyst 9800-l-c Catalyst 9800-l-f Catalyst Iw6300 Esw-6300-con-x-k9 Wireless Lan Controller Wireless Lan Controller Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T18:02:03.327Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3560

cve-icon Vulnrichment

Updated: 2024-08-04T07:37:54.978Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:22.137

Modified: 2024-11-21T05:31:19.017

Link: CVE-2020-3560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses