You are here
Home > Preporuke > Ranjivost u Cisco Aironet 1810, 1830 i 1850 Access Point serijama uređaja

Ranjivost u Cisco Aironet 1810, 1830 i 1850 Access Point serijama uređaja

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Aironet 1810, 1830, and 1850 Series Access Points Point-to-Point Tunneling Protocol Denial of Service Vulnerability

Advisory ID: cisco-sa-20180502-ap-ptp

Revision: 1.0

For Public Release: 2018 May 2 16:00 GMT

Last Updated: 2018 May 2 16:00 GMT

CVE ID(s): CVE-2018-0234

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary

=======

A vulnerability in the implementation of Point-to-Point Tunneling Protocol (PPTP) functionality in Cisco Aironet 1810, 1830, and 1850 Series Access Points could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to insufficient validation of Generic Routing Encapsulation (GRE) frames that pass through the data plane of an affected access point. An attacker could exploit this vulnerability by initiating a PPTP connection to an affected access point from a device that is registered to the same wireless network as the access point and sending a malicious GRE frame through the data plane of the access point. A successful exploit could allow the attacker to cause the NSS core process on the affected access point to crash, which would cause the access point to reload and result in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-ptp [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-ptp”]

—–BEGIN PGP SIGNATURE—–
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=qa7A
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa patch

Otkriveni su sigurnosni nedostaci u programskom paketu patch za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close