A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.
This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Aironet 1530e
Subscribe
Aironet 1530i
Subscribe
Aironet 1552h
Subscribe
Aironet 1552s
Subscribe
Aironet 1552wu
Subscribe
Aironet 1700i
Subscribe
Aironet 2700e
Subscribe
Aironet 2700i
Subscribe
Aironet 3700e
Subscribe
Aironet 3700i
Subscribe
Aironet 3700p
Subscribe
Ap801
Subscribe
Ap802
Subscribe
Ap803
Subscribe
Ios Xe
Subscribe
Iw3700
Subscribe
Wireless Lan Controller Software
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18069 | A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco aironet 1530e Cisco aironet 1530i Cisco aironet 1552h Cisco aironet 1552s Cisco aironet 1552wu Cisco aironet 1700i Cisco aironet 2700e Cisco aironet 2700i Cisco aironet 3700e Cisco aironet 3700i Cisco aironet 3700p Cisco ap801 Cisco ap802 Cisco ap803 Cisco ios Xe Cisco iw3700 Cisco wireless Lan Controller Software |
|
| CPEs | cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1530e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1530i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1552s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1552wu:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1700i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_2700e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_2700i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3700e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3700i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3700p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ap801:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ap802:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ap803:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:iw3700:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco aironet 1530e Cisco aironet 1530i Cisco aironet 1552h Cisco aironet 1552s Cisco aironet 1552wu Cisco aironet 1700i Cisco aironet 2700e Cisco aironet 2700i Cisco aironet 3700e Cisco aironet 3700i Cisco aironet 3700p Cisco ap801 Cisco ap802 Cisco ap803 Cisco ios Xe Cisco iw3700 Cisco wireless Lan Controller Software |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-01T21:59:41.707Z
Reserved: 2023-11-08T15:08:07.647Z
Link: CVE-2024-20354
Updated: 2024-08-01T21:59:41.707Z
Status : Analyzed
Published: 2024-03-27T17:15:53.660
Modified: 2025-08-13T17:18:10.143
Link: CVE-2024-20354
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD