Description
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
Published: 2021-09-23
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-7032 Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Catalyst 9300-24p-a Catalyst 9300-24p-e Catalyst 9300-24s-a Catalyst 9300-24s-e Catalyst 9300-24t-a Catalyst 9300-24t-e Catalyst 9300-24u-a Catalyst 9300-24u-e Catalyst 9300-24ux-a Catalyst 9300-24ux-e Catalyst 9300-48p-a Catalyst 9300-48p-e Catalyst 9300-48s-a Catalyst 9300-48s-e Catalyst 9300-48t-a Catalyst 9300-48t-e Catalyst 9300-48u-a Catalyst 9300-48u-e Catalyst 9300-48un-a Catalyst 9300-48un-e Catalyst 9300-48uxm-a Catalyst 9300-48uxm-e Catalyst 9300l Catalyst 9300l-24p-4g-a Catalyst 9300l-24p-4g-e Catalyst 9300l-24p-4x-a Catalyst 9300l-24p-4x-e Catalyst 9300l-24t-4g-a Catalyst 9300l-24t-4g-e Catalyst 9300l-24t-4x-a Catalyst 9300l-24t-4x-e Catalyst 9300l-48p-4g-a Catalyst 9300l-48p-4g-e Catalyst 9300l-48p-4x-a Catalyst 9300l-48p-4x-e Catalyst 9300l-48t-4g-a Catalyst 9300l-48t-4g-e Catalyst 9300l-48t-4x-a Catalyst 9300l-48t-4x-e Catalyst 9300l Stack Catalyst 9400 Catalyst 9400 Supervisor Engine-1 Catalyst 9407r Catalyst 9410r Catalyst 9500 Catalyst 9800-40 Catalyst 9800-80 Catalyst 9800-cl Catalyst 9800-l Catalyst 9800-l-c Catalyst 9800-l-f Catalyst 9800 Firmware Embedded Wireless Controller Ios Xe
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-07T21:52:33.399Z

Reserved: 2020-11-13T00:00:00.000Z

Link: CVE-2021-1565

cve-icon Vulnrichment

Updated: 2024-08-03T16:18:10.351Z

cve-icon NVD

Status : Modified

Published: 2021-09-23T03:15:11.407

Modified: 2024-11-21T05:44:38.083

Link: CVE-2021-1565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses