The vulnerability is due to lack of proper error handling when the 802.11 frame is received with an unexpected status code. An attacker could exploit this vulnerability by sending a crafted 802.11 frame to the targeted device. An exploit could allow the attacker to impact the availability of the device due to the connection table being filled with invalid connections.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2iBwWRq
The vulnerability is due to lack of proper error handling when the 802.11 frame is received with an unexpected status code. An attacker could exploit this vulnerability by sending a crafted 802.11 frame to the targeted device. An exploit could allow the attacker to impact the availability of the device due to the connection table being filled with invalid connections.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2iBwWRq
Security Impact Rating: Medium
CVE: CVE-2016-9220
from Cisco Security Advisory http://ift.tt/2iBwWRq
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.