A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1111-4pwe
Subscribe
1111-8plteeawb
Subscribe
1111-8pwb
Subscribe
1113-8plteeawe
Subscribe
1113-8pmwe
Subscribe
1113-8pwe
Subscribe
1116-4plteeawe
Subscribe
1116-4pwe
Subscribe
1117-4plteeawe
Subscribe
1117-4pmlteeawe
Subscribe
1117-4pmwe
Subscribe
1117-4pwe
Subscribe
Access Points
Subscribe
Aironet 1542d
Subscribe
Aironet 1542i
Subscribe
Aironet 1562d
Subscribe
Aironet 1562e
Subscribe
Aironet 1562i
Subscribe
Aironet 1815
Subscribe
Aironet 1830e
Subscribe
Aironet 1830i
Subscribe
Aironet 1850e
Subscribe
Aironet 1850i
Subscribe
Aironet 2800e
Subscribe
Aironet 2800i
Subscribe
Aironet 3800e
Subscribe
Aironet 3800i
Subscribe
Aironet 3800p
Subscribe
Aironet 4800
Subscribe
Aironet Access Point Software
Subscribe
Business 140ac
Subscribe
Business 145ac
Subscribe
Business 240ac
Subscribe
Business Access Points
Subscribe
Catalyst 9105
Subscribe
Catalyst 9115
Subscribe
Catalyst 9117
Subscribe
Catalyst 9120
Subscribe
Catalyst 9130
Subscribe
Catalyst 9800-40
Subscribe
Catalyst 9800-80
Subscribe
Catalyst 9800-cl
Subscribe
Catalyst 9800-l
Subscribe
Catalyst 9800-l-c
Subscribe
Catalyst 9800-l-f
Subscribe
Catalyst Iw6300
Subscribe
Esw-6300-con-x-k9
Subscribe
Wireless Lan Controller
Subscribe
Wireless Lan Controller Software
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24831 | A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T18:02:03.327Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3560
Updated: 2024-08-04T07:37:54.978Z
Status : Modified
Published: 2020-09-24T18:15:22.137
Modified: 2024-11-21T05:31:19.017
Link: CVE-2020-3560
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD