A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
Metrics
Affected Vendors & Products
References
History
Sat, 09 Nov 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2021-03-24T20:15:46.915280Z
Updated: 2024-11-08T23:31:57.262Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1373
Vulnrichment
Updated: 2024-08-03T16:11:17.041Z
NVD
Status : Modified
Published: 2021-03-24T21:15:11.960
Modified: 2024-11-21T05:44:12.353
Link: CVE-2021-1373
Redhat
No data.