CVE-ID |
CVE-2017-12274
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
Description |
A vulnerability in Extensible Authentication Protocol (EAP) ingress
frame processing for the Cisco Aironet 1560, 2800, and 3800 Series
Access Points could allow an unauthenticated, Layer 2 radio frequency
(RF) adjacent attacker to cause the Access Point (AP) to reload,
resulting in a denial of service (DoS) condition. The vulnerability is
due to insufficient validation of the EAP frame. An attacker could
exploit this vulnerability by sending a malformed EAP frame to the
targeted device. A successful exploit could allow the attacker to cause
the AP to reload, resulting in a DoS condition while the AP is
reloading. It may be necessary to manually power cycle the device in
order for it to recover. This vulnerability affects the following Cisco
products running either the Lightweight AP Software or Mobility Express
image: Aironet 1560 Series Access Points, Aironet 2800 Series Access
Points, Aironet 3800 Series Access Points. Note: The Cisco Aironet 1560
Series Access Point device is supported as of release 8.3.112.0. Cisco
Bug IDs: CSCve18935.
|
References |
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
Assigning CNA |
Cisco Systems, Inc. |
Date Entry Created |
20170803 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
Phase (Legacy) |
Assigned (20170803) |
Votes (Legacy) |
|
Comments (Legacy) |
|
Proposed (Legacy) |
N/A |
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
For More Information: cve@mitre.org
|