Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 9300-24p-a
Subscribe
Catalyst 9300-24p-e
Subscribe
Catalyst 9300-24s-a
Subscribe
Catalyst 9300-24s-e
Subscribe
Catalyst 9300-24t-a
Subscribe
Catalyst 9300-24t-e
Subscribe
Catalyst 9300-24u-a
Subscribe
Catalyst 9300-24u-e
Subscribe
Catalyst 9300-24ux-a
Subscribe
Catalyst 9300-24ux-e
Subscribe
Catalyst 9300-48p-a
Subscribe
Catalyst 9300-48p-e
Subscribe
Catalyst 9300-48s-a
Subscribe
Catalyst 9300-48s-e
Subscribe
Catalyst 9300-48t-a
Subscribe
Catalyst 9300-48t-e
Subscribe
Catalyst 9300-48u-a
Subscribe
Catalyst 9300-48u-e
Subscribe
Catalyst 9300-48un-a
Subscribe
Catalyst 9300-48un-e
Subscribe
Catalyst 9300-48uxm-a
Subscribe
Catalyst 9300-48uxm-e
Subscribe
Catalyst 9300l
Subscribe
Catalyst 9300l-24p-4g-a
Subscribe
Catalyst 9300l-24p-4g-e
Subscribe
Catalyst 9300l-24p-4x-a
Subscribe
Catalyst 9300l-24p-4x-e
Subscribe
Catalyst 9300l-24t-4g-a
Subscribe
Catalyst 9300l-24t-4g-e
Subscribe
Catalyst 9300l-24t-4x-a
Subscribe
Catalyst 9300l-24t-4x-e
Subscribe
Catalyst 9300l-48p-4g-a
Subscribe
Catalyst 9300l-48p-4g-e
Subscribe
Catalyst 9300l-48p-4x-a
Subscribe
Catalyst 9300l-48p-4x-e
Subscribe
Catalyst 9300l-48t-4g-a
Subscribe
Catalyst 9300l-48t-4g-e
Subscribe
Catalyst 9300l-48t-4x-a
Subscribe
Catalyst 9300l-48t-4x-e
Subscribe
Catalyst 9300l Stack
Subscribe
Catalyst 9400
Subscribe
Catalyst 9400 Supervisor Engine-1
Subscribe
Catalyst 9407r
Subscribe
Catalyst 9410r
Subscribe
Catalyst 9500
Subscribe
Catalyst 9800-40
Subscribe
Catalyst 9800-80
Subscribe
Catalyst 9800-cl
Subscribe
Catalyst 9800-l
Subscribe
Catalyst 9800-l-c
Subscribe
Catalyst 9800-l-f
Subscribe
Catalyst 9800 Firmware
Subscribe
Embedded Wireless Controller
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7032 | Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-07T21:52:33.399Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1565
Updated: 2024-08-03T16:18:10.351Z
Status : Modified
Published: 2021-09-23T03:15:11.407
Modified: 2024-11-21T05:44:38.083
Link: CVE-2021-1565
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD