A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation of Cisco Aironet and Catalyst 9100 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to improper resource management during CAPWAP message processing. An attacker could exploit this vulnerability by sending a high volume of legitimate wireless management frames within a short time to an affected device. A successful exploit could allow the attacker to cause a device to restart unexpectedly, resulting in a DoS condition for clients associated with the AP.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Aironet 1540
Subscribe
Aironet 1540 Firmware
Subscribe
Aironet 1560
Subscribe
Aironet 1560 Firmware
Subscribe
Aironet 1800
Subscribe
Aironet 1850 Firmware
Subscribe
Aironet 2800
Subscribe
Aironet 2800 Firmware
Subscribe
Aironet 3800
Subscribe
Aironet 3800 Firmware
Subscribe
Aironet 4800
Subscribe
Aironet 4800 Firmware
Subscribe
Catalyst 9100
Subscribe
Catalyst 9100 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-6273 | A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation of Cisco Aironet and Catalyst 9100 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to improper resource management during CAPWAP message processing. An attacker could exploit this vulnerability by sending a high volume of legitimate wireless management frames within a short time to an affected device. A successful exploit could allow the attacker to cause a device to restart unexpectedly, resulting in a DoS condition for clients associated with the AP. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 21 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-21T19:08:07.209Z
Reserved: 2019-08-20T00:00:00.000Z
Link: CVE-2019-15264
Updated: 2024-08-05T00:42:03.636Z
Status : Modified
Published: 2019-10-16T19:15:14.050
Modified: 2024-11-21T04:28:19.327
Link: CVE-2019-15264
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD