Lucene search

K
cveCiscoCVE-2020-3552
HistorySep 24, 2020 - 6:15 p.m.

CVE-2020-3552

2020-09-2418:15:21
CWE-476
cisco
web.nvd.nist.gov
33
cve-2020-3552
cisco
aironet
access points
software
vulnerability
ethernet
dos
nvd

CVSS2

6.1

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.4

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

25.0%

A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the attacker to cause a NULL pointer access that results in a reload of the affected device.

Affected configurations

Nvd
Node
ciscowireless_lan_controllerRange8.68.10.105.0
AND
ciscoaironet_1542dMatch-
OR
ciscoaironet_1542iMatch-
OR
ciscoaironet_1562dMatch-
OR
ciscoaironet_1562eMatch-
OR
ciscoaironet_1562iMatch-
OR
ciscoaironet_1810Match-
OR
ciscoaironet_1815Match-
OR
ciscoaironet_1830eMatch-
OR
ciscoaironet_1830iMatch-
OR
ciscoaironet_1840Match-
OR
ciscoaironet_1850eMatch-
OR
ciscoaironet_1850iMatch-
OR
ciscoaironet_2800eMatch-
OR
ciscoaironet_2800iMatch-
OR
ciscoaironet_3800eMatch-
OR
ciscoaironet_3800iMatch-
OR
ciscoaironet_3800pMatch-
OR
ciscoaironet_4800Match-
Node
ciscobusiness_access_pointsRange10.010.1.1.0
Node
ciscoaccess_pointsRange<16.12.4a
AND
ciscocatalyst_9800-40Match-
OR
ciscocatalyst_9800-80Match-
OR
ciscocatalyst_9800-clMatch-
OR
ciscocatalyst_9800-lMatch-
OR
ciscocatalyst_9800-l-cMatch-
OR
ciscocatalyst_9800-l-fMatch-
Node
ciscoaironet_access_point_softwareMatch8.10\(1.255\)
AND
ciscoaironet_1850eMatch-
OR
ciscoaironet_1850iMatch-
VendorProductVersionCPE
ciscowireless_lan_controller*cpe:2.3:o:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*
ciscoaironet_1542d-cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*
ciscoaironet_1542i-cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*
ciscoaironet_1562d-cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*
ciscoaironet_1562e-cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*
ciscoaironet_1562i-cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*
ciscoaironet_1810-cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*
ciscoaironet_1815-cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*
ciscoaironet_1830e-cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*
ciscoaironet_1830i-cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 281

CNA Affected

[
  {
    "product": "Cisco Aironet Access Point Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

6.1

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.4

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

25.0%

Related for CVE-2020-3552