A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.

Project Subscriptions

Vendors Products
1100-4g\/6g Integrated Services Router Subscribe
1100-4p Integrated Services Router Subscribe
1100-8p Integrated Services Router Subscribe
1100 Integrated Services Router Subscribe
1101-4p Integrated Services Router Subscribe
1101 Integrated Services Router Subscribe
1109-2p Integrated Services Router Subscribe
1109-4p Integrated Services Router Subscribe
1109 Integrated Services Router Subscribe
1111x-8p Integrated Services Router Subscribe
1111x Integrated Services Router Subscribe
111x Integrated Services Router Subscribe
1120 Integrated Services Router Subscribe
1160 Integrated Services Router Subscribe
6300 Series Access Points Subscribe
Aironet 1540 Subscribe
Aironet 1542d Subscribe
Aironet 1542i Subscribe
Aironet 1560 Subscribe
Aironet 1562d Subscribe
Aironet 1562e Subscribe
Aironet 1562i Subscribe
Aironet 1800 Subscribe
Aironet 1800i Subscribe
Aironet 1810 Subscribe
Aironet 1810w Subscribe
Aironet 1815 Subscribe
Aironet 1815i Subscribe
Aironet 1830 Subscribe
Aironet 1830e Subscribe
Aironet 1830i Subscribe
Aironet 1840 Subscribe
Aironet 1850 Subscribe
Aironet 1850e Subscribe
Aironet 1850i Subscribe
Aironet 2800 Subscribe
Aironet 2800e Subscribe
Aironet 2800i Subscribe
Aironet 3800 Subscribe
Aironet 3800e Subscribe
Aironet 3800i Subscribe
Aironet 3800p Subscribe
Aironet 4800 Subscribe
Aironet Access Point Software Subscribe
Catalyst 9100 Subscribe
Catalyst 9105 Subscribe
Catalyst 9105axi Subscribe
Catalyst 9105axw Subscribe
Catalyst 9115 Subscribe
Catalyst 9115 Ap Subscribe
Catalyst 9115axe Subscribe
Catalyst 9115axi Subscribe
Catalyst 9117 Subscribe
Catalyst 9117 Ap Subscribe
Catalyst 9117axi Subscribe
Catalyst 9120 Subscribe
Catalyst 9120 Ap Subscribe
Catalyst 9120axe Subscribe
Catalyst 9120axi Subscribe
Catalyst 9120axp Subscribe
Catalyst 9124 Subscribe
Catalyst 9124axd Subscribe
Catalyst 9124axi Subscribe
Catalyst 9130 Subscribe
Catalyst 9130 Ap Subscribe
Catalyst 9130axe Subscribe
Catalyst 9130axi Subscribe
Catalyst Iw6300 Subscribe
Catalyst Iw6300 Ac Subscribe
Catalyst Iw6300 Dc Subscribe
Catalyst Iw6300 Dcw Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21390 A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-07T21:58:19.967Z

Reserved: 2021-06-15T00:00:00

Link: CVE-2021-34740

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:48.125Z

cve-icon NVD

Status : Modified

Published: 2021-09-23T03:15:19.947

Modified: 2024-11-21T06:11:05.760

Link: CVE-2021-34740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses