A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1100-4g\/6g Integrated Services Router
Subscribe
1100-4p Integrated Services Router
Subscribe
1100-8p Integrated Services Router
Subscribe
1100 Integrated Services Router
Subscribe
1101-4p Integrated Services Router
Subscribe
1101 Integrated Services Router
Subscribe
1109-2p Integrated Services Router
Subscribe
1109-4p Integrated Services Router
Subscribe
1109 Integrated Services Router
Subscribe
1111x-8p Integrated Services Router
Subscribe
1111x Integrated Services Router
Subscribe
111x Integrated Services Router
Subscribe
1120 Integrated Services Router
Subscribe
1160 Integrated Services Router
Subscribe
6300 Series Access Points
Subscribe
Aironet 1540
Subscribe
Aironet 1542d
Subscribe
Aironet 1542i
Subscribe
Aironet 1560
Subscribe
Aironet 1562d
Subscribe
Aironet 1562e
Subscribe
Aironet 1562i
Subscribe
Aironet 1800
Subscribe
Aironet 1800i
Subscribe
Aironet 1810
Subscribe
Aironet 1810w
Subscribe
Aironet 1815
Subscribe
Aironet 1815i
Subscribe
Aironet 1830
Subscribe
Aironet 1830e
Subscribe
Aironet 1830i
Subscribe
Aironet 1840
Subscribe
Aironet 1850
Subscribe
Aironet 1850e
Subscribe
Aironet 1850i
Subscribe
Aironet 2800
Subscribe
Aironet 2800e
Subscribe
Aironet 2800i
Subscribe
Aironet 3800
Subscribe
Aironet 3800e
Subscribe
Aironet 3800i
Subscribe
Aironet 3800p
Subscribe
Aironet 4800
Subscribe
Aironet Access Point Software
Subscribe
Catalyst 9100
Subscribe
Catalyst 9105
Subscribe
Catalyst 9105axi
Subscribe
Catalyst 9105axw
Subscribe
Catalyst 9115
Subscribe
Catalyst 9115 Ap
Subscribe
Catalyst 9115axe
Subscribe
Catalyst 9115axi
Subscribe
Catalyst 9117
Subscribe
Catalyst 9117 Ap
Subscribe
Catalyst 9117axi
Subscribe
Catalyst 9120
Subscribe
Catalyst 9120 Ap
Subscribe
Catalyst 9120axe
Subscribe
Catalyst 9120axi
Subscribe
Catalyst 9120axp
Subscribe
Catalyst 9124
Subscribe
Catalyst 9124axd
Subscribe
Catalyst 9124axi
Subscribe
Catalyst 9130
Subscribe
Catalyst 9130 Ap
Subscribe
Catalyst 9130axe
Subscribe
Catalyst 9130axi
Subscribe
Catalyst Iw6300
Subscribe
Catalyst Iw6300 Ac
Subscribe
Catalyst Iw6300 Dc
Subscribe
Catalyst Iw6300 Dcw
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21390 | A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-07T21:58:19.967Z
Reserved: 2021-06-15T00:00:00
Link: CVE-2021-34740
Updated: 2024-08-04T00:19:48.125Z
Status : Modified
Published: 2021-09-23T03:15:19.947
Modified: 2024-11-21T06:11:05.760
Link: CVE-2021-34740
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD