Wednesday, January 18, 2017

Cisco Mobility Express 2800 and 3800 802.11 Denial of Service Vulnerability

A vulnerability in 802.11 ingress packet processing of the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause the connection table to be full of invalid connections and be unable to process new incoming requests.

The vulnerability is due to lack of proper error handling when the 802.11 frame is received with an unexpected status code. An attacker could exploit this vulnerability by sending a crafted 802.11 frame to the targeted device. An exploit could allow the attacker to impact the availability of the device due to the connection table being filled with invalid connections.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2iBwWRq A vulnerability in 802.11 ingress packet processing of the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause the connection table to be full of invalid connections and be unable to process new incoming requests.

The vulnerability is due to lack of proper error handling when the 802.11 frame is received with an unexpected status code. An attacker could exploit this vulnerability by sending a crafted 802.11 frame to the targeted device. An exploit could allow the attacker to impact the availability of the device due to the connection table being filled with invalid connections.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://ift.tt/2iBwWRq
Security Impact Rating: Medium
CVE: CVE-2016-9220

from Cisco Security Advisory http://ift.tt/2iBwWRq

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.