First published: Thu Aug 27 2009(Updated: )
Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet AP1100 | ||
Cisco Aironet AP1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2976 is considered a medium severity vulnerability as it allows unauthorized disclosure of sensitive network information.
To fix CVE-2009-2976, update the firmware of affected Cisco Aironet Lightweight Access Point devices to the latest version provided by Cisco.
CVE-2009-2976 affects Cisco Aironet AP1100 and AP1200 series access points.
Remote attackers can exploit CVE-2009-2976 to sniff multicast data frames and discover Wireless LAN Controller MAC addresses and IP configurations.
CVE-2009-2976 is classified as a remote vulnerability, as it can be exploited by attackers from outside the network.