Description
A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
Published: 2021-09-23
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-21390 A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco 1100-4g\/6g Integrated Services Router 1100-4p Integrated Services Router 1100-8p Integrated Services Router 1100 Integrated Services Router 1101-4p Integrated Services Router 1101 Integrated Services Router 1109-2p Integrated Services Router 1109-4p Integrated Services Router 1109 Integrated Services Router 1111x-8p Integrated Services Router 1111x Integrated Services Router 111x Integrated Services Router 1120 Integrated Services Router 1160 Integrated Services Router 6300 Series Access Points Aironet 1540 Aironet 1542d Aironet 1542i Aironet 1560 Aironet 1562d Aironet 1562e Aironet 1562i Aironet 1800 Aironet 1800i Aironet 1810 Aironet 1810w Aironet 1815 Aironet 1815i Aironet 1830 Aironet 1830e Aironet 1830i Aironet 1840 Aironet 1850 Aironet 1850e Aironet 1850i Aironet 2800 Aironet 2800e Aironet 2800i Aironet 3800 Aironet 3800e Aironet 3800i Aironet 3800p Aironet 4800 Aironet Access Point Software Catalyst 9100 Catalyst 9105 Catalyst 9105axi Catalyst 9105axw Catalyst 9115 Catalyst 9115 Ap Catalyst 9115axe Catalyst 9115axi Catalyst 9117 Catalyst 9117 Ap Catalyst 9117axi Catalyst 9120 Catalyst 9120 Ap Catalyst 9120axe Catalyst 9120axi Catalyst 9120axp Catalyst 9124 Catalyst 9124axd Catalyst 9124axi Catalyst 9130 Catalyst 9130 Ap Catalyst 9130axe Catalyst 9130axi Catalyst Iw6300 Catalyst Iw6300 Ac Catalyst Iw6300 Dc Catalyst Iw6300 Dcw
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-07T21:58:19.967Z

Reserved: 2021-06-15T00:00:00.000Z

Link: CVE-2021-34740

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:48.125Z

cve-icon NVD

Status : Modified

Published: 2021-09-23T03:15:19.947

Modified: 2024-11-21T06:11:05.760

Link: CVE-2021-34740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses