Lucene search

K
cve[email protected]CVE-2021-34740
HistorySep 23, 2021 - 3:15 a.m.

CVE-2021-34740

2021-09-2303:15:19
CWE-401
web.nvd.nist.gov
26
cve-2021-34740
wlan control protocol
wcp
cisco
aironet
access point
dos
denial of service
nvd

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

25.2%

A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.

Affected configurations

NVD
Node
ciscoaironet_access_point_softwareRange8.10.08.10.162.0
OR
ciscoaironet_access_point_softwareMatch17.2
OR
ciscoaironet_access_point_softwareMatch17.3
AND
cisco1100-4g\/6g_integrated_services_routerMatch-
OR
cisco1100-4p_integrated_services_routerMatch-
OR
cisco1100-8p_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco1101-4p_integrated_services_routerMatch-
OR
cisco1101_integrated_services_routerMatch-
OR
cisco1109-2p_integrated_services_routerMatch-
OR
cisco1109-4p_integrated_services_routerMatch-
OR
cisco1109_integrated_services_routerMatch-
OR
cisco1111x-8p_integrated_services_routerMatch-
OR
cisco1111x_integrated_services_routerMatch-
OR
cisco111x_integrated_services_routerMatch-
OR
cisco1120_integrated_services_routerMatch-
OR
cisco1160_integrated_services_routerMatch-
OR
cisco6300_series_access_pointsMatch-
OR
ciscoaironet_1540Match-
OR
ciscoaironet_1542dMatch-
OR
ciscoaironet_1542iMatch-
OR
ciscoaironet_1560Match-
OR
ciscoaironet_1562dMatch-
OR
ciscoaironet_1562eMatch-
OR
ciscoaironet_1562iMatch-
OR
ciscoaironet_1800Match-
OR
ciscoaironet_1800iMatch-
OR
ciscoaironet_1810Match-
OR
ciscoaironet_1810wMatch-
OR
ciscoaironet_1815Match-
OR
ciscoaironet_1815iMatch-
OR
ciscoaironet_1830Match-
OR
ciscoaironet_1830eMatch-
OR
ciscoaironet_1830iMatch-
OR
ciscoaironet_1840Match-
OR
ciscoaironet_1850Match-
OR
ciscoaironet_1850eMatch-
OR
ciscoaironet_1850iMatch-
OR
ciscoaironet_2800Match-
OR
ciscoaironet_2800eMatch-
OR
ciscoaironet_2800iMatch-
OR
ciscoaironet_3800Match-
OR
ciscoaironet_3800eMatch-
OR
ciscoaironet_3800iMatch-
OR
ciscoaironet_3800pMatch-
OR
ciscoaironet_4800Match-
OR
ciscocatalyst_9100Match-
OR
ciscocatalyst_9105Match-
OR
ciscocatalyst_9105axiMatch-
OR
ciscocatalyst_9105axwMatch-
OR
ciscocatalyst_9115Match-
OR
ciscocatalyst_9115_apMatch-
OR
ciscocatalyst_9115axeMatch-
OR
ciscocatalyst_9115axiMatch-
OR
ciscocatalyst_9117Match-
OR
ciscocatalyst_9117_apMatch-
OR
ciscocatalyst_9117axiMatch-
OR
ciscocatalyst_9120Match-
OR
ciscocatalyst_9120_apMatch-
OR
ciscocatalyst_9120axeMatch-
OR
ciscocatalyst_9120axiMatch-
OR
ciscocatalyst_9120axpMatch-
OR
ciscocatalyst_9124Match-
OR
ciscocatalyst_9124axdMatch-
OR
ciscocatalyst_9124axiMatch-
OR
ciscocatalyst_9130Match-
OR
ciscocatalyst_9130_apMatch-
OR
ciscocatalyst_9130axeMatch-
OR
ciscocatalyst_9130axiMatch-
OR
ciscocatalyst_iw6300Match-
OR
ciscocatalyst_iw6300_acMatch-
OR
ciscocatalyst_iw6300_dcMatch-
OR
ciscocatalyst_iw6300_dcwMatch-

CNA Affected

[
  {
    "product": "Cisco Aironet Access Point Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

25.2%

Related for CVE-2021-34740