A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-09-24T17:50:59.499854Z

Updated: 2024-11-13T18:02:03.327Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3560

cve-icon Vulnrichment

Updated: 2024-08-04T07:37:54.978Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:22.137

Modified: 2024-11-21T05:31:19.017

Link: CVE-2020-3560

cve-icon Redhat

No data.