You are here
Home > Preporuke > Ranjivost u Cisco Aironet 1560, 2800 i 3800 serijama uređaja

Ranjivost u Cisco Aironet 1560, 2800 i 3800 serijama uređaja

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Aironet 1560, 2800, and 3800 Series Access Point Platforms Extensible Authentication Protocol Denial of Service Vulnerability

Advisory ID: cisco-sa-20171101-aironet2

Revision: 1.0

For Public Release: 2017 November 1 16:00 GMT

Last Updated: 2017 November 1 16:00 GMT

CVE ID(s): CVE-2017-12274

CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
A vulnerability in Extensible Authentication Protocol (EAP) ingress frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to insufficient validation of the EAP frame. An attacker could exploit this vulnerability by sending a malformed EAP frame to the targeted device. A successful exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. It may be necessary to manually power cycle the device in order for it to recover.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet2”]

—–BEGIN PGP SIGNATURE—–
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=/o2P
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-11-0026-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost u Cisco Aironet 1560, 2800 i 3800 serijama uređaja

Otkrivena je ranjivost u 802.11 upravljačkom okviru procesa pridruživanja u Cisco Aironet 1560, 2800 i 3800 seriji uređaja. Ranjivost je...

Close