A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.

Project Subscriptions

Vendors Products
1111-4pwe Subscribe
1111-8plteeawb Subscribe
1111-8pwb Subscribe
1113-8plteeawe Subscribe
1113-8pmwe Subscribe
1113-8pwe Subscribe
1116-4plteeawe Subscribe
1116-4pwe Subscribe
1117-4plteeawe Subscribe
1117-4pmlteeawe Subscribe
1117-4pmwe Subscribe
1117-4pwe Subscribe
Access Points Subscribe
Aironet 1542d Subscribe
Aironet 1542i Subscribe
Aironet 1562d Subscribe
Aironet 1562e Subscribe
Aironet 1562i Subscribe
Aironet 1815 Subscribe
Aironet 1830e Subscribe
Aironet 1830i Subscribe
Aironet 1850e Subscribe
Aironet 1850i Subscribe
Aironet 2800e Subscribe
Aironet 2800i Subscribe
Aironet 3800e Subscribe
Aironet 3800i Subscribe
Aironet 3800p Subscribe
Aironet 4800 Subscribe
Aironet Access Point Software Subscribe
Business 140ac Subscribe
Business 145ac Subscribe
Business 240ac Subscribe
Business Access Points Subscribe
Catalyst 9105 Subscribe
Catalyst 9115 Subscribe
Catalyst 9117 Subscribe
Catalyst 9120 Subscribe
Catalyst 9130 Subscribe
Catalyst 9800-40 Subscribe
Catalyst 9800-80 Subscribe
Catalyst 9800-cl Subscribe
Catalyst 9800-l Subscribe
Catalyst 9800-l-c Subscribe
Catalyst 9800-l-f Subscribe
Catalyst Iw6300 Subscribe
Esw-6300-con-x-k9 Subscribe
Wireless Lan Controller Subscribe
Wireless Lan Controller Software Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24831 A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T18:02:03.327Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3560

cve-icon Vulnrichment

Updated: 2024-08-04T07:37:54.978Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:22.137

Modified: 2024-11-21T05:31:19.017

Link: CVE-2020-3560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses